SlideShare ist ein Scribd-Unternehmen logo
1 von 316
Downloaden Sie, um offline zu lesen
K025 LTE Technology for Engineers Page 9
Introduction to LTE
1 Introduction to LTE
1.1Where are we?
C H A P T E R 1
Page 10 K025 LTE Technology for Engineers
Introduction to LTE
K025 LTE Technology for Engineers Page 11
Introduction to LTE
1.2Release 99
UMTS/W-CDMA was initially conceived as a circuit switched based system and was
not well-suited to IP packet based data traffic. Once the basic UMTS system was
released and deployed, the need for better packet data capability became clear,
especially with the rapidly increasing trend towards Internet style packet data
services which are particularly bursty in nature. It supports Cell-DCH and typical
speeds 384kb/s.
Release 5: This release included the core of HSDPA itself. It provided for downlink
packet support, reduced delays, a raw data rate (i.e. including payload, protocols,
error correction, etc.) of 14 Mbps and gave an overall increase of around three times
over the 3GPP UMTS Release 99 standard.
Release 6: This included the core of HSUPA with an enhanced uplink with improved
packet data support. This provided reduced delays, an uplink raw data rate of 5.74
Mbps and it gave an increased capacity of around twice that offered by the original
Release 99 UMTS standard. Also included within this release was the Multimedia
Broadcast Multicast Services (MBMS), providing improved broadcast services such as
Mobile TV.
Release 7: This release of the 3GPP standard included downlink MIMO operation as
well as support for higher order modulation up to 64 QAM in the uplink and 16 QAM
in the downlink. However, it only allows for either MIMO or higher order
modulation. It also introduced protocol enhancements to allow support for
Continuous Packet Connectivity (CPC).
Page 12 K025 LTE Technology for Engineers
Introduction to LTE
Release 8: This release of the standard defines dual carrier operation as well as
allowing simultaneous operation of the high order modulation schemes and MIMO.
Further to this, latency is improved to keep it in line with the requirements for many
new applications being used.
K025 LTE Technology for Engineers Page 13
Introduction to LTE
Rb_phy includes DPDCH (User data + L3 control) + Error protection + DPCCH (L1
control)
DPCCH = Dedicated Physical Control Channel
In UL, symbol rate=ch bit rate.
The DPDCH channel bit rate is less than channel bit rate because the latter contains
both DPDCH and DPCCH ch bit rates. The exact DPDCH bit rate depends on the slot
format. DPDCH is shared by logical/transport channels (DCCH/DCH +
DTCH/DCH).
The exact DTCH bit rate depends on the selected channel configuration or transport
format, for example with AMR 12.2, the DTCH is 12.2 kbit/s and DCCH is 3.7 kbit/s
by default (SF = 128).
For the channel coding, three options are supported: convolutional coding, turbo
coding, or no channel coding. Channel coding selection is indicated by upper layers.
For example, with single DPDCH in UL:
– 960kbps can be obtained with SF=4, no coding
– 400-500 kbps with coding
With 3 codes, up to 5740 kbps uncoded or 2Mbps (or even more) with coding.
Error Correction Coding Parameters
Transport channel type Coding scheme Coding rate
BCH, PCH, RACH Convolutional code 1/2
CPCH, DCH, DSCH, FACH Convolutional code 1/3, 1/2
CPCH, DCH, DSCH, FACH Turbo code 1/3
CPCH, DCH, DSCH, FACH No coding -
Page 14 K025 LTE Technology for Engineers
Introduction to LTE
K025 LTE Technology for Engineers Page 15
Introduction to LTE
1.3UTRAN
In UMTS, the UTRAN is formed from RNCs, Node Bs and their defined interfaces. An
RNC is the UMTS equivalent of a GSM BSC, but has greater functionality. One of the
main differences between UMTS (Release 99) and GSM (Release 99) is that there is an
Iur interface interconnecting multiple RNCs. This additional interface permits the
RNCs to communicate with each other, allowing soft handover (not present in GSM).
Another difference between GSM and UMTS is that some of the Mobility
Management (MM) has been moved to the RNC from the Core Network, allowing
UTRAN initiated paging. The RNC has greater control over a group of cells and the
functionality allows soft handover.
Page 16 K025 LTE Technology for Engineers
Introduction to LTE
Core Network
The Core Network is divided in circuit switched and packet switched domains. Some
of the circuit switched elements are Mobile services Switching Centre (MSC), Visitor
location register (VLR) and Gateway MSC. Packet switched elements are Serving
GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN). Some
network elements, like EIR, HLR, VLR and AUC are shared by both domains.
The functions of RNC are:
 Radio Resource Control
 Admission Control
 Channel Allocation
 Load Control
 Handover Control
 Macro Diversity
 Ciphering
 Segmentation / Reassembly
 Broadcast Signalling
 Open Loop Power Control
K025 LTE Technology for Engineers Page 17
Introduction to LTE
Page 18 K025 LTE Technology for Engineers
Introduction to LTE
K025 LTE Technology for Engineers Page 19
Introduction to LTE
Page 20 K025 LTE Technology for Engineers
Introduction to LTE
Co-existence with legacy standards and systems: LTE users should be able to make
voice calls from their terminal and have access to basic data services even when they
are in areas without LTE coverage. LTE therefore allows smooth, seamless service
handover in areas of HSPA, WCDMA or GSM/GPRS/EDGE coverage. Furthermore,
LTE/SAE supports not only intra-system and intersystem handovers, but inter-
domain handovers between packet switched and circuit switched sessions.
K025 LTE Technology for Engineers Page 21
Introduction to LTE
1.43G Services and QoS Classes
In UMTS, four Quality of Service classes have been defined:
Conversational class is the QoS class for delay-sensitive real time services such as
speech telephony.
Streaming class is also regarded as a real-time QoS class. It is also sensitive to delays; it
carries traffic, which looks real time to a human user. An application for streaming
class QoS is audio streaming, where music files are downloaded to the receiver. There
may be an interruption in the transmission, which is not relevant for the user of the
application, as long as there is still enough data left in the buffer of the receiving
equipment for seamless application provision.
Interactive class is a non-real time QoS class. It is used for applications with limited
delay-sensitivity (so-called interactive applications). But many applications on the
internet still have timing constraints, such as http, ftp, telnet, and smtp. A response to
a request is expected within a specific period of time. This is the QoS offered by the
interactive class.
Background class is a non-real time QoS class for background applications, which are
not delay sensitive. Example applications are email and file downloading.
Page 22 K025 LTE Technology for Engineers
Introduction to LTE
1.5HS-PDSCH
K025 LTE Technology for Engineers Page 23
Introduction to LTE
1.6HSDPA
Page 24 K025 LTE Technology for Engineers
Introduction to LTE
1.7HSUPA
K025 LTE Technology for Engineers Page 25
Introduction to LTE
[CL] From one phase to another, the main limitation is the product development -
which resources you can offer to the user.
TTI - 2 ms (HS-DSCH), 10 ms, 20 ms, 40 ms, and 80 ms
TTI is length of transmission on the radio link
Page 26 K025 LTE Technology for Engineers
Introduction to LTE
K025 LTE Technology for Engineers Page 27
Introduction to LTE
Page 28 K025 LTE Technology for Engineers
Introduction to LTE
1.8Upgrade Paths to LTE
Who Needs LTE?
Less than a decade on from the launch of the first 3G/UMTS networks, why is the
cellular industry considering additional investments in its radio access and core
network infrastructures?
The answer lies in a changing market landscape, where user expectations are
constantly increasing. In the fixed world, broadband connectivity is now ubiquitous
with multi-megabit speeds available at reasonable cost to customers and business
users via DSL and cable connections.
K025 LTE Technology for Engineers Page 29
Introduction to LTE
1.9R8 LTE
The result of these radio interface features is significantly improved radio
performance, yielding up to five times the average throughput of HSPA. Downlink
peak data rates are extended up to a theoretical maximum of 300 Mbit/s per 20 MHz
of spectrum. Similarly, LTE theoretical uplink rates can reach 75 Mbit/s per 20 MHz
of spectrum, with theoretical support for at least 200 active users per cell in 5 MHz.
Reduced latency: By reducing round-trip times to 10ms or even less (compared with
40–50ms for HSPA), LTE delivers a more responsive user experience. This permits
interactive, real-time services such as high-quality audio/videoconferencing and
multi-player gaming.
Page 30 K025 LTE Technology for Engineers
Introduction to LTE
K025 LTE Technology for Engineers Page 31
Introduction to LTE
Page 32 K025 LTE Technology for Engineers
Introduction to LTE
K025 LTE Technology for Engineers Page 33
Introduction to LTE
1.10 Scalability of Bandwidth
Page 34 K025 LTE Technology for Engineers
Introduction to LTE
1.11 LTE Key Features
Urban areas:
 Most likely LTE will be deployed.
 Stepwise deployment in UMTS 2.1 bands will be possible at a later stage.
Rural areas:
Option 1: deploy UMTS in 900 MHz band.
Advantage: rollout can start now
Disadvantage: a block of 5 MHz need to be taken out of the GSM band. Not a lot of
operators can affort to take out this much spectrum due to heavy usage in this band
Option 2: Introduce LTE in 900 MHz band
Advantages: reuse of GSM 900 Sites; step by step introduction of LTE with smaller
granularity (1.4 / 3 / 5 /…MHz).
K025 LTE Technology for Engineers Page 35
Introduction to LTE
Page 36 K025 LTE Technology for Engineers
Introduction to LTE
K025 LTE Technology for Engineers Page 37
Introduction to LTE
Page 38 K025 LTE Technology for Engineers
Introduction to LTE
K025 LTE Technology for Engineers Page 39
Introduction to LTE
Page 40 K025 LTE Technology for Engineers
Introduction to LTE
K025 LTE Technology for Engineers Page 41
IP Core Network Overview
2 IP Core Network
Overview
2.1The TCP/IP Layers
TCP/IP can be represented by the US DoD Model. This model describes the
relationship between the main protocols used by TCP/IP.
C H A P T E R 2
Page 42 K025 LTE Technology for Engineers
IP Core Network Overview
Prior to the development of this model most network protocols were vendor
dependent. The architecture behind TCP/IP is different in the sense that the same
protocol model can be run on a multitude of different computer systems without
modification of the operating system or hardware architecture. TCP/IP is designed to
run as an application.
The protocol was primarily used to support application-orientated functions and
process-to-process communications between hosts. Specific applications to provide
basic network services for users were written to run with TCP/IP. The objective of the
lower protocols was to provide support for the network layer application services.
K025 LTE Technology for Engineers Page 43
IP Core Network Overview
2.2Transport Layer Protocols
Transport layer protocols provide two basic functions to the application layer services
- quality of service and application multiplexing through port numbers. TCP/IP has
two main transport layer protocols – TCP and UDP.
UDP provides a simple datagram delivery service adding application multiplexing
and a checksum to the underlying IP layer. It therefore provides the same unreliable,
connectionless delivery service as IP. It does not use acknowledgements to confirm
that messages have arrived, it does not provide any flow control mechanisms, and it
does no sequencing - UDP messages can be duplicated, arrive out of order or not at
all. UDP works well on LANs where error rates are low and delays small, but on
WANs it behaves poorly, especially for large data transfers.
TCP provides a reliable, connection-oriented, stream based delivery system by adding
acknowledgements, sequencing and flow control to IP. This makes TCP much more
efficient on WANs and for large data transfers, but it has a large protocol overhead
which makes it slower and less efficient than UDP in certain applications.
Most applications tend to use TCP because it provides reliable delivery, but time-
sensitive, transactional and broadcast based applications need to use UDP.
Page 44 K025 LTE Technology for Engineers
IP Core Network Overview
K025 LTE Technology for Engineers Page 45
IP Core Network Overview
Page 46 K025 LTE Technology for Engineers
IP Core Network Overview
K025 LTE Technology for Engineers Page 47
IP Core Network Overview
2.3Application Layer Services
The power behind TCP/IP is not the sophisticated and powerful nature of the
protocol architecture, but rather it is the absolute simplicity of the protocol. This is
equally true of the application-level services which are designed to provide network
services for users.
TCP/IP provides a consistent application front end to users regardless of the
operating system, platform, or network architecture which is used. Many of the
application level services retain the look and feel of simple character-oriented
applications. Even today, with TCP/IP providing GUI, once the superficial GUI is
removed, the same basic element of code is used to provide the network service.
The Transport layer protocols (TCP/UDP) use Port Numbers to uniquely identify
each application level service. The client usually generates a port number above 1,023
to identify the process and the server always uses a well known port number.
Page 48 K025 LTE Technology for Engineers
IP Core Network Overview
K025 LTE Technology for Engineers Page 49
IP Core Network Overview
Page 50 K025 LTE Technology for Engineers
IP Core Network Overview
K025 LTE Technology for Engineers Page 51
IP Core Network Overview
Page 52 K025 LTE Technology for Engineers
IP Core Network Overview
2.4TCP/IP Inter-networks
The term internetworking is used to describe a number of discrete physical networks
that are connected together to form an internet. A characteristic of such an internet is
that the underlying physical network structure should be invisible to network users.
Internetworking is defined as a combination of interconnection and interoperation
(the ability to physically exchange data and make some sense from it).
K025 LTE Technology for Engineers Page 53
IP Core Network Overview
2.5IP Datagram Format
VERS Protocol version (currently 4)
HLEN Length of header in 32 bit words (normally 5)
Service Type Sets a precedence and Type of Service for the packet (normally 0)
Total Length Length of IP datagram in octets including header & data -
Maximum of 65535
Identification Unique ID for each datagram, used for fragmentation
Flags Controls fragmentation (DF - don't fragment and MF - more
fragments)
Fragment Offset Position of data in this fragment compared to original datagram -
units of 8 octets
Time To Live Specifies how long (in router hops) the datagram is to remain in the
internet.
Protocol ID of transport protocol - UDP, TCP, (ICMP) etc.
Checksum Checksum of the header only
Source IP Address 32 bit IP address of source
Destination IP Address 32 bit IP address of destination
IP Options Option type and data for additional facilities - network
management and debugging
Page 54 K025 LTE Technology for Engineers
IP Core Network Overview
Padding Padding to extend options data to multiple of 4 octets
DATA The higher level Protocol Data Unit (PDU)
K025 LTE Technology for Engineers Page 55
IP Core Network Overview
2.6Maximum Transfer Unit (MTU)
Each physical network has a defined limit on the size of protocol which it can
support. This is known as the Maximum Transfer Unit (MTU) and is generally
considered a hard limit of the network which cannot be increased. The MTU is the
maximum size of software protocol which can be sent, and not the maximum size of
frame which can be supported. If hardware control information (such as physical
addresses) is added to the MTU, the maximum frame size can be derived.
Ethernet limits transfers to 1500 bytes of data, which FDDI permits approximately
4470 bytes of data per frame. MTUs vary considerably in size. Local area networks,
which generally use high bandwidth, low bit error rate media have relatively large
MTUs, while wide area networks have much smaller MTUs. Limiting datagram size
to fit the smallest possible MTU in the internet makes transfers inefficient when those
datagrams pass across a network which can carry larger size frames. However,
allowing datagrams to be larger than the minimum network MTU in an internet
means that a datagram may not always fit into a single network frame.
Instead of making IP datagrams adhere to the constraints of physical networks,
TCP/IP software chooses a convenient initial datagram size and arranges a way to
divide large datagrams into smaller pieces when the datagram needs to traverse a
network that has a small MTU. The small pieces into which a datagram is divided are
called fragments, and the process of dividing a datagram is known as fragmentation.
Page 56 K025 LTE Technology for Engineers
IP Core Network Overview
2.7Fragmentation
Hosts can choose to send datagrams up to the supported MTU of their own network.
Routers interconnect different physical networks with varying MTUs. Routers can
fragment datagrams if desired to permit transport across networks which have
smaller MTUs.
The IP protocol does not limit datagram size nor does it guarantee that the datagram
will be delivered without fragmentation. The source can choose any datagram size it
thinks appropriate; fragmentation and reassembly occur automatically, without
taking action. The IP specification states that routers must accept datagrams up to the
maximum of the MTUs of the networks to which they are attached.
Once a datagram has been fragmented, the fragments travel all the way to the final
destination, where they reassembled. This has a number of disadvantages - small
fragments must be carried by networks which could support larger MTUs, and
reassembling the datagrams at the destination can lead to inefficiency, particularly if
fragments are lost. If fragments are lost, the original datagram cannot be reassembled.
The receiving machine starts a reassembly timer when it receives an initial fragment.
If the timer expires before all fragments arrive, the receiving machine discards the
surviving pieces without processing the datagram. Performing reassembly at the
ultimate destination works well, and permits each fragment to be routed
independently as well as sparing resources on routers.
K025 LTE Technology for Engineers Page 57
IP Core Network Overview
2.8Time To Live (TTL)
The TIME To LIVE specifies how long, in seconds, the datagram is permitted to
remain in the internet. Whenever a host injects a datagram into the internet, it sets a
maximum time that the datagram should survive. Router and hosts that process
datagrams must decrement the TIME To LIVE field as time passes and remove the
datagram from the internet when the value in this field reaches zero.
Estimating exact time is difficult because routers do not usually know the transit time
of physical networks. A few rules simplify processing and make it easy to handle
datagrams without synchronise clocks. First, each router along the path from source
to destination is required to decrement the TIME To LIVE field when the datagram
header is processed. Furthermore, to handle cases of overloaded routers that
introduce long delays, each router records the local time when the datagram arrives
and decrements the TIME To LIVE by the number of seconds that the datagram
remained inside the router waiting for service.
Page 58 K025 LTE Technology for Engineers
IP Core Network Overview
K025 LTE Technology for Engineers Page 59
IP Core Network Overview
2.9IP Addresses
TCP/IP uses a 32-bit binary address to uniquely identify a device on a TCP/IP
internetwork. The binary address string is a network layer logical address which must
be configured by the network manager. The address is used to identify the device in a
virtual network.
The 32-bit address structure is divided into a single-level hierarchy where the leading
bits in the address are used to describe a network in logical terms and the remaining
bits are used to describe the host on the logical network. The number of bits which are
used in each case varies, and will be covered later. The leading bits which make up
the logical network address are used to provide a routing (packet forwarding)
mechanism between logical networks. This allows for far more efficient routing than a
flat address space.
Page 60 K025 LTE Technology for Engineers
IP Core Network Overview
2.10 Dotted Decimal Notation
Binary address strings are very difficult to work with. To overcome this problem and
make logical addressing easier to comprehend, the 32-bit address string is divided
into 8-bit bytes and then converted into the corresponding decimal notation. It is this
dotted decimal notation which is used to configure hosts on a TCP/IP network.
However, it should be noted that decimal addresses are a human and humane
interface to TCP/IP. As far as the host is concerned, the address appears and is used
as a binary string. This is the cause of much confusion.
K025 LTE Technology for Engineers Page 61
IP Core Network Overview
2.11 Address Classes
There are five main classes of IP addresses but only three are directly usable: A, B and
C.
For a Class A address, 8-bits are used to logically identify the network. For Class B,
16-bits are used, and for Class C, 24-bits are used. In each case, once the network bits
have been allocated, the remaining bits are used to logically identify the node.
Class E addresses are reserved for testing and development by the IETF and cannot be
assigned to any device. Class D addresses are software multicast addresses and
reserved for the use of routing protocols such as OSPF, RIPv2 and so on.
The address categorisation is derived from the high bit order rule of the first byte. The
high bit order rule is interrupted by every TCP/IP stack as soon as an address is
entered. This rule is also used to define the decimal ranges in the first byte of each
address.
Page 62 K025 LTE Technology for Engineers
IP Core Network Overview
2.12 Special IP Addresses
Some binary bit patterns are reserved for management reasons and cannot be
allocated to devices on a TCP/IP network.
Although the Internet Protocol has been stable for a considerable number of years, the
way IP addresses are used and interpreted has changed over the years.
In general, 1’s indicate "All" and 0’s indicate "Any" - the local broadcast address is an
obvious exception; a broadcast to all hosts on all networks (on the Internet) would
cause chaos!
K025 LTE Technology for Engineers Page 63
IP Core Network Overview
2.13 Realtime Transport Protocol (RTP)
Page 64 K025 LTE Technology for Engineers
IP Core Network Overview
K025 LTE Technology for Engineers Page 65
IP Core Network Overview
Page 66 K025 LTE Technology for Engineers
IP Core Network Overview
2.14 Base Header Format
Although the IPv6 header must accommodate larger addresses, an IPv6 base header
contains less information than an IPv4 header. Options and some of the fixed fields
that appear in an IPv4 header have been moved to extension headers. Changes in the
datagram header reflect changes in the protocol:
 Alignment has been changed from 32-bit multiple to 64-bit multiples.
 The header length field has been eliminated, and the datagram length field has
been replaced by a Payload
 Length field.
 The size of the source and destination address fields has been increased to 16 bytes
each.
 Fragmentation information has been moved out of fixed fields in the base header
into an extension header.
 The Time-to-Live field has been replaced by a Hop Limit field.
 The Service Type field has been replaced by a Flow Label field.
 The Protocol field has been replaced by a field that specifies the type of the next
header.
K025 LTE Technology for Engineers Page 67
IP Core Network Overview
IPv6 handles packet length specification in a new way. Firstly, because the size of the
base header is fixed at 40 bytes, the header does not include a field for the header
length. Secondly, IPv6 replaces IPv4 packet length field with a 16-bit Payload Length
field that specifies the number of octets carried in the packet excluding the header. An
IPv6 packet can contain 64k bytes of data.
Page 68 K025 LTE Technology for Engineers
IP Core Network Overview
K025 LTE Technology for Engineers Page 69
IP Core Network Overview
Page 70 K025 LTE Technology for Engineers
IP Core Network Overview
The fixed header occupies the first 40 octets (320 bits) of the IPv6 packet. It contains
the source and destination addresses, traffic classification options, a hop counter, and
a pointer for extension headers if any. The Next Header field, present in each extension
as well, points to the next element in the chain of extensions
K025 LTE Technology for Engineers Page 71
IP Core Network Overview
Page 72 K025 LTE Technology for Engineers
IP Core Network Overview
2.15 The Need for QoS
K025 LTE Technology for Engineers Page 73
IP Core Network Overview
2.16 IP Precedence
IP Precedence was designed in IPv4 by the IETF.
It uses 3 bits of the 8-bit Type of Service (TOS) field of an IP header. There are 8
classes of services in IP Precedence. The classification range is 0-7 where 0 (zero) is the
lowest and 7 is the highest priority.
The original intention of the TOS field was for a sending host to specify a preference
for how the datagram would be handled as it made its way through an internet. For
instance, one host could set its IPv4 datagrams' TOS field value to prefer low delay,
while another might prefer high reliability.
Page 74 K025 LTE Technology for Engineers
IP Core Network Overview
IP Precedence provides the ability to classify network packets at Layer 3. With IP
Precedence configured, network packets traverse IP Precedence devices according to
the priority you set. Priority traffic is always serviced before traditional traffic.
K025 LTE Technology for Engineers Page 75
IP Core Network Overview
2.17 Type of Service
The Type of Service field in the IP header was originally defined in RFC 791.
It defined a mechanism for assigning a priority to each IP packet as well as a
mechanism to request specific treatment such as high throughput, high reliability or
low latency.
Differentiated Services Code Point
In RFC 2474 the definition of this entire field was changed. It is now called the "DS"
(Differentiated Services) field and the upper 6 bits contain a value called the "DSCP"
(Differentiated Services Code Point). Since RFC 3168, the remaining two bits (the two
least significant bits) are used for Explicit Congestion Notification.
Page 76 K025 LTE Technology for Engineers
IP Core Network Overview
In theory, a network could have up to 64 (i.e. 26) different traffic classes using
different markings in the DSCP. The DiffServ RFCs recommend, but do not require,
certain encodings. This gives a network operator great flexibility in defining traffic
classes. In practice, however, most networks use the following commonly-defined
Per-Hop Behaviors:
 Default PHB—which is typically best-effort traffic
 Expedited Forwarding (EF) PHB—dedicated to low-loss, low-latency traffic
 Assured Forwarding (AF) PHB— which gives assurance of delivery under
conditions
 Class Selector PHBs—which are defined to maintain backward compatibility with
the IP Precedence field
K025 LTE Technology for Engineers Page 77
IP Core Network Overview
The DS field consists of a 6-bit differentiated services code point (DSCP) RFC 2474.
Explicit Congestion Notification occupies the least-significant 2 bits. ECN allows end-
to-end notification of network congestion without dropping packets
Page 78 K025 LTE Technology for Engineers
IP Core Network Overview
K025 LTE Technology for Engineers Page 79
IP Core Network Overview
Because the CE indication can only be handled effectively by an upper layer protocol
that supports it, ECN is only used in conjunction with upper layer protocols (for
example, TCP).
Page 80 K025 LTE Technology for Engineers
IP Core Network Overview
K025 LTE Technology for Engineers Page 81
IP Core Network Overview
2.18 Differentiated Services
Page 82 K025 LTE Technology for Engineers
IP Core Network Overview
If you need to mark packets in your network and all of the devices support IP DSCP
marking and matching, use the IP DSCP marking to mark your packets. This is
because the IP DSCP markings provide more packet marking options. 64 individual
values can be marked using IP DSCP marking, while only 8 individual values can be
marked using IP precedence marking.
K025 LTE Technology for Engineers Page 83
IP Core Network Overview
Page 84 K025 LTE Technology for Engineers
IP Core Network Overview
Expedited Forwarding (EF) PHB—dedicated to low-loss, low-latency traffic. These
characteristics are suitable for voice, video and other realtime services.
EF traffic is often given strict priority queuing above all other traffic classes. Because
an overload of EF traffic will cause queuing delays and affect the jitter and delay
tolerances within the class, EF traffic is often strictly controlled through admission
control, policing and other mechanisms.
K025 LTE Technology for Engineers Page 85
IP Core Network Overview
Page 86 K025 LTE Technology for Engineers
IP Core Network Overview
2.19 Assured Forwarding
There are four assured forwarding (AF) classes, AF1x through AF4x. The first number
corresponds to the AF class and the second number (x) refers to the level of drop
preference within each AF class. There are three drop probabilities, ranging from 1
(low drop) through 3 (high drop). Depending on a network policy, packets can be
selected for a PHB based on required throughput, delay, jitter, loss, or according to
the priority of access to network services
K025 LTE Technology for Engineers Page 87
IP Core Network Overview
Page 88 K025 LTE Technology for Engineers
IP Core Network Overview
2.20 Weighted Fair Queing
K025 LTE Technology for Engineers Page 89
IP Core Network Overview
2.20.1 RNC Scheduling
Page 90 K025 LTE Technology for Engineers
IP Core Network Overview
2.21 Questions
K025 LTE Technology for Engineers Page 91
Layer 2 Switching
3 Layer 2 Switching
3.1Introduction
C H A P T E R 3
Page 92 K025 LTE Technology for Engineers
Layer 2 Switching
With the introduction of 4G systems, wireless networks are evolving to next-
generation packet architectures capable of supporting enhanced broadband
connections. Simple text messaging and slow email downloads are being replaced by
high-speed connections that support true mobile office applications, real time video,
streaming music, and other rich multimedia applications. 4G wireless networks will
approach the broadband speeds and user experience now provided by traditional
DSL and cable modem wireline service.
From the wireless operator’s perspective, 4G systems are vastly more efficient at
using valuable wireless spectrum. These spectral efficiency improvements support
new high-speed services, as well as larger numbers of users. The additional speeds
and capacity provided by 4G wireless networks put additional strains on mobile
backhaul networks and the carriers providing these backhaul services. Not only are
the transport requirements much higher, but there is also a fundamental shift from
TDM transport in 2G and 3G networks to packet transport in 4G networks.
Understanding the impact of 4G on mobile backhaul transport is critical to deploying
efficient, cost-effective transport solutions that meet wireless carrier expectations for
performance, reliability and cost.
K025 LTE Technology for Engineers Page 93
Layer 2 Switching
3.2Spectral Efficiency
The amount of bandwidth on a wireless network is ultimately constrained by two
factors: the spectral efficiency of the wireless interface and the amount of licensed
spectrum a carrier owns. Spectral efficiency is a fancy way of saying how much
information can be transmitted over a given radio channel (i.e., Hz). Spectral
efficiency is measured as the amount of data (bps) that can be transmitted for every
Hz of spectrum; the higher the number (bps/Hz), the better. Newer technologies,
such as LTE, use advanced modulation schemes (OFDM) that support higher spectral
efficiencies and higher data rates than 2G and 3G wireless networks.
Page 94 K025 LTE Technology for Engineers
Layer 2 Switching
K025 LTE Technology for Engineers Page 95
Layer 2 Switching
3.3TCP/IP Layers
TCP/IP can be represented by the US DoD Model. This model describes the
relationship between the main protocols used by TCP/IP.
Prior to the development of this model most network protocols were vendor-
dependent. The architecture behind TCP/IP is different in the sense that the same
protocol model can be run on a multitude of different computer systems without
modification of the operating system or hardware architecture. TCP/IP is designed to
run as an application.
The protocol was primarily used to support application-orientated functions and
process-to-process communications between hosts. Specific applications to provide
basic network services for users were written to run with TCP/IP. The objective of the
lower protocols was to provide support for the network layer application services.
Page 96 K025 LTE Technology for Engineers
Layer 2 Switching
K025 LTE Technology for Engineers Page 97
Layer 2 Switching
3.4Message Switching
Message switching moves the entire message from connecting point to connecting
point, one step at a time. This method is sometimes referred to as ‘store & forward’.
Message switching creates a virtual or dedicated connection to the next switching
station. The entire message is transmitted and then the connection is terminated. The
receiving station must buffer the entire message and then create a connection to the
next switching station and forward the entire message. The message is forwarded one
step at time until it is received at the final destination.
The best example of message switching is E-mail servers.
Page 98 K025 LTE Technology for Engineers
Layer 2 Switching
3.5Frames
A frame is the fundamental unit of data transfer used on LANs. It has specific
network characteristics which relate to the type of network it originated on. All IEEE
compliant frames have a similar structure and start with a preamble which is
followed by hardware addresses for source and destination stations. Some network
frames (Token Ring) have some special fields for specific MAC control. After the
source MAC address, the LLC protocol data unit follows. Generally, LLC is three
bytes in size followed by the network layer protocol. The maximum and minimum
size of the protocol which follows LLC is dependent on the type of network. The
frame is finished by a four-byte trailer used for error checking.
K025 LTE Technology for Engineers Page 99
Layer 2 Switching
Page 100 K025 LTE Technology for Engineers
Layer 2 Switching
K025 LTE Technology for Engineers Page 101
Layer 2 Switching
3.6Hardware Addresses
A universal address is assigned to a Network Interface Card (NIC) on manufacture.
The address is stored in an EPROM and, as the device is initialised, the address is
copied into RAM where it can be used by software. The address is 48 bits in size,
divided into six eight-bit fields. The first byte of the address (left hand side) is byte 0
and the last byte (right hand side) is byte 5. The first three bytes of the address (0, 1
and 2) indicate the vendor, and are unique to that vendor. The last three bytes of the
address (3, 4 and 5) can be assigned by the vendor (approx. 16M addresses per
Vendor Code).
For IEEE addressing, two other bits are important in the address. The least significant
bit of the first byte (byte 0) indicates an Individual/Group address. A value of 0
indicates a unicast address and 1 indicates a multicast. The second bit of this byte
indicates a universally assigned address or locally managed (where the address has
been changed by software). Locally managed addresses are supported by different
LAN technologies, but caution must be used when setting locally managed addresses.
It is the Network Manager’s responsibility to ensure that the assigned addresses are
unique.
Hardware addresses are Data Link characteristics of the OSI protocol stack. They are
separate from software protocol addresses, which are Network layer addresses.
Page 102 K025 LTE Technology for Engineers
Layer 2 Switching
3.7Store & Forward
A store and forward switching hub stores the full incoming frame in a buffer. This
enables the switch to perform a CRC check to see if the frame contains any errors. If
the frame is error-free, the switch uses an address lookup table to obtain a destination
port. Once the address is obtained, the switch performs a cross-connect operation and
forwards the frame to the destination.
Since the frame must be buffered in shared RAM, this results in greater latency than
that provided by cut through switching. A key advantage of store and forward
switches, results from the buffering of the frames in the switch. Since they are placed
in memory, this enables frame processing functions to be added to the switch,
permitting vendors to support a variety of filtering operations and the gathering of
statistics for management reports.
K025 LTE Technology for Engineers Page 103
Layer 2 Switching
3.7.1 Cut Through Switching
A cut through switch examines the destination address of each frame entering the
port. It then searches a table of addresses associated with ports to obtain a port
destination. Once the port destination is determined, the switch initiates the cross-
connection between incoming and outgoing port.
Cut through switching minimises the delay or latency associated with placing a frame
received on one port onto another port. Since the switching decision is made once the
destination address is read, this means that the full frame is not examined. Thus the
switch cannot perform error checking on a frame. This limitation does not present a
problem on most LANs, due to the extremely low error rates. However, when
erroneous frames are encountered, they are passed from one network segment to
another. This results in an unnecessary increase in network utilisation on the
destination segment, as a store and forward switch would discard the frames
containing one or more bit errors.
Page 104 K025 LTE Technology for Engineers
Layer 2 Switching
3.7.2 Modified Cut-Through
Modified cut-through switches attempt to offer the best of both worlds by holding an
incoming Ethernet frame until the first 64 bytes have been received. If the frame is
bad, it is nearly always detected within the first 64 bytes, so a trade-off between
switch latency and error-checking is achieved. In effect, modified cut-though switches
act as store and forward switches for short frames. For large frames they act like cut-
through switches.
K025 LTE Technology for Engineers Page 105
Layer 2 Switching
3.8Switches and VLAN’s
Page 106 K025 LTE Technology for Engineers
Layer 2 Switching
K025 LTE Technology for Engineers Page 107
Layer 2 Switching
Within corporate networks system administrators like to segregate users into separate
networks. The old method would have required that all users of one network be
connected to the same physical devices.
With modern switches, it is possible to isolate users into separate networks, whilst
connected to the same layer 2 devices.
Users belonging to the same network are simply attached to ports on a layer 2 switch.
These ports are then programmed to be part of the same virtual network. A virtual
network is known as a Virtual LAN (VLAN) and user ports on the same virtual
network would share the same VLAN ID.
You may have users who wish to be part of the same VLAN whilst connected to
different layer 2 switches. A physical connection between the switches needs to be
established, and the ports at either end of the link would have to be part of the same
VLAN.
VLAN Tagging (IEEE 802.1q)
The diagram above also shows the additional fields within the layer 2 ethernet frame
that can be used to identify traffic from separate VLANs.
The fields are:
 TPI Tag Protocol Identifier.
 P Priority Bits.
 C Canonical, format of MAC addresses.
 VI = VLAN ID.
Page 108 K025 LTE Technology for Engineers
Layer 2 Switching
K025 LTE Technology for Engineers Page 109
Layer 2 Switching
3.9Link Aggregation
Page 110 K025 LTE Technology for Engineers
Layer 2 Switching
K025 LTE Technology for Engineers Page 111
Layer 2 Switching
Page 112 K025 LTE Technology for Engineers
Layer 2 Switching
K025 LTE Technology for Engineers Page 113
Layer 2 Switching
Page 114 K025 LTE Technology for Engineers
Layer 2 Switching
3.10 Carrier Ethernet Overview
The Metro Ethernet Forum (MEF) has led the industry in propagating Carrier
Ethernet and has identified five key attributes that distinguish Carrier Ethernet from
traditional LAN based Ethernet. These are:
 Standardised services
 Scalability
 Service manageability
 Quality of service
 Reliability
Making Ethernet Connection-Oriented
Historically, Ethernet has been a connectionless technology by design. In classic LAN
environments, the connectionless capabilities of Ethernet MAC bridging and
CSMA/CD provided considerable flexibility, simplicity, and economy in networking
latency-insensitive traffic within a single, well-bounded administrative domain.
K025 LTE Technology for Engineers Page 115
Layer 2 Switching
Page 116 K025 LTE Technology for Engineers
Layer 2 Switching
K025 LTE Technology for Engineers Page 117
Layer 2 Switching
Page 118 K025 LTE Technology for Engineers
Layer 2 Switching
3.11 The Three Essential Functions of Connection-
Oriented Ethernet
The three essential functions that make Ethernet connection-oriented are:
 Predetermined EVC paths
 Resource reservation and admission control
 Per-connection traffic engineering and traffic management
The ability to predetermine the EVC path through the Ethernet network is
fundamental to making Ethernet connection-oriented. In classic connectionless
Ethernet bridging, Ethernet frames are forwarded in the network according to the
MAC bridging tables in the learning bridge. If a destination MAC address is
unknown, the bridge floods the frame to all ports in the broadcast domain. Spanning
tree protocols like IEEE 802.1s are run to ensure that there are no loops in the
topology and to provide network restoration in the event of failure. Depending upon
the location and sequence of network failures, the path EVCs take through the
network may be difficult to predetermine.
Predetermining the EVC path—either through a management plane application or via
an embedded control plane—ensures that all frames in the EVC pass over the same
sets of nodes. Therefore, intelligence regarding the connection as a whole can now be
imparted to all nodes along the path.
K025 LTE Technology for Engineers Page 119
Layer 2 Switching
Resource reservation and CAC is the next critical function. Now that the EVC path
through the network has been explicitly identified, the actual bandwidth and queuing
resources required for each EVC are reserved in all nodes along the path. This is vital
to ensure the highest possible levels of performance in terms of packet loss, latency,
and jitter. CAC ensures that the requested resource is actually available in each node
along the path prior to establishing the EVC.
Once the path has been determined and the resources allocated, the traffic
engineering and traffic management functions ensure that the requested connection
performance is actually delivered. After packets have been classified on network
ingress, a variety of traffic management functions must be provided in any packet-
based network. These include:
 Policing
 Shaping
 Queuing
 Scheduling
Page 120 K025 LTE Technology for Engineers
Layer 2 Switching
K025 LTE Technology for Engineers Page 121
Layer 2 Switching
Page 122 K025 LTE Technology for Engineers
Layer 2 Switching
K025 LTE Technology for Engineers Page 123
Layer 2 Switching
Page 124 K025 LTE Technology for Engineers
Layer 2 Switching
3.12 Colour Marking
Packet classification is the processes of identifying to which EVCs the incoming
frames belong. The Ingress equipment can examine a variety of Ethernet and IP layer
information to make this decision. Once the incoming frame is classified, policing is
then applied to ensure that all frames coming into the network conform to the traffic
contract, known as the bandwidth profile, agreed to upon connection setup. Two-
level, three-colour marking allows incoming frames that conform to the CIR to be
admitted to the network. Frames that exceed even the EIR are discarded immediately,
and frames that exceed the CIR, but not the EIR, are marked for possible discard later,
should the network become congested. An EVC can be subject to a single such policer
if the bandwidth profile is applied to the entire EVC. EVCs can also include
bandwidth profiles for each of many CoS classes within the EVC. In this case, a single
EVC can be subject to multiple policers.
K025 LTE Technology for Engineers Page 125
Layer 2 Switching
3.13 Traffic Policing and Shaping
Page 126 K025 LTE Technology for Engineers
Layer 2 Switching
3.14 MEF Bandwidth Profiles
K025 LTE Technology for Engineers Page 127
Layer 2 Switching
Page 128 K025 LTE Technology for Engineers
Layer 2 Switching
3.15 Mapping at the UNIs
K025 LTE Technology for Engineers Page 129
Layer 2 Switching
Page 130 K025 LTE Technology for Engineers
Layer 2 Switching
3.16 Class of Service (CoS)
K025 LTE Technology for Engineers Page 131
Layer 2 Switching
3.17 IEEE 802.1Q — Virtual LANS (VLANS)
802.1Q provides for tagging Ethernet frames with VLAN IDs. It provides the
mechanism that enables multiple-bridged networks to transparently share the same
physical network while maintaining the isolation between networks. Ethernet
switches deliver packets within the same VLAN and send the traffic between different
VLANs to internal or external routers to perform the routing function. 802.1Q only
supports up to 4094 VLANs, which is a scaling constraint for service providers.
Page 132 K025 LTE Technology for Engineers
Layer 2 Switching
3.18 Carrier Ethernet Services
K025 LTE Technology for Engineers Page 133
Layer 2 Switching
Based on the Metro Ethernet Forum’s (MEF) definitions, there are two broad
categories of Carrier Ethernet services: point-to-point, referred to as E-Line services;
and multipoint, referred to as E-LAN services. Both E-line and E-LAN services are
often provided with multiple classes of service (CoS); where a single Ethernet virtual
connection (EVC) can carry traffic with one or more CoS. Service providers desire to
build networks that offer all services simultaneously on a single converged
infrastructure.
Page 134 K025 LTE Technology for Engineers
Layer 2 Switching
K025 LTE Technology for Engineers Page 135
Layer 2 Switching
Page 136 K025 LTE Technology for Engineers
Layer 2 Switching
3.19 Questions
K025 LTE Technology for Engineers Page 137
LTE Basic Air Interface
4 LTE Basic Air Interface
4.1New Air Interface
C H A P T E R 4
Page 138 K025 LTE Technology for Engineers
LTE Basic Air Interface
4.2OFDMA
The downlink transmission scheme for E-UTRA FDD and TDD modes is based on
conventional OFDM. In an OFDM system, the available spectrum is divided into
multiple carriers, called subcarriers. Each of these subcarriers is independently
modulated by a low rate data stream. OFDM is used as well in WLAN, WiMAX and
broadcast technologies like DVB. OFDM has several benefits including its robustness
against multipath fading and its efficient receiver architecture.
K025 LTE Technology for Engineers Page 139
LTE Basic Air Interface
4.3Advanced Antenna Techniques
LTE uses advanced antenna techniques and wider spectrum allocations to provide
higher data rates throughout the cell area. LTE supports MIMO, SDMA and
beamforming . These techniques are complementary and can be used to trade off
between higher sector capacity, higher user data rates, or higher cell-edge rates, and
thus enable operators to have finer control over the end-user experience.
DL MIMO—LTE supports up to 4x4 MIMO in the DL, which uses four transmit
antennas at the Node B to transmit orthogonal (parallel) data streams to the four
receive antennas at the user equipment (UE). Using additional antennas and signal
processing at the receiver and transmitter, MIMO increases the system capacity and
user data rates without using additional transmit power or bandwidth. To be most
effective, MIMO needs a high signal-to-noise ratio (SNR) at the UE and a rich
scattering environment. High SNR ensures that the UE is able to decode the incoming
signal, and a rich scattering environment ensures the orthogonality of the multiple
data streams. The MIMO benefit is therefore maximised in a dense urban
environment, where there is enough scattering and the small cell sizes provide an
environment of high SNRs at the UE.
Page 140 K025 LTE Technology for Engineers
LTE Basic Air Interface
K025 LTE Technology for Engineers Page 141
LTE Basic Air Interface
SU-MIMO
Similarly, on the UL, SDMA enables two users in the cell to simultaneously send data
to the eNode B, using the same time-frequency resource. Even though the
transmissions are simultaneous, the spatial separation ensures that the two data
streams do not interfere with each other. Allowing these concurrent transmissions
increases the cell capacity in both the DL and the UL. LTE does not support
simultaneous MIMO and SDMA operation to a user; hence, there is a tradeoff
between higher user data rates and higher system capacity in the DL.
Page 142 K025 LTE Technology for Engineers
LTE Basic Air Interface
Beamforming
Beamforming increases the user data rates by focusing the transmit power in the
direction of the user, effectively increasing the received signal strength at the UE.
Beamforming provides the most benefits to users in weaker-signal-strength areas, like
the edge of the cell coverage. Beamforming ensures that cell-edge rates are high, and
enables the operator to deploy high-bandwidth services without concern for service
degradation at the cell edge.
K025 LTE Technology for Engineers Page 143
LTE Basic Air Interface
4.4Cyclic Delay Diversity
Page 144 K025 LTE Technology for Engineers
LTE Basic Air Interface
4.5FDD/TDD
LTE can be used in both paired (FDD) and unpaired (TDD) spectrum. Leading
suppliers’ first product releases will support both duplex schemes. In general, FDD is
more efficient and represents higher device and infrastructure volumes, while TDD is
a good complement, for example in spectrum centre gaps.
All cellular systems today use FDD, and more than 90 per cent of the world’s mobile
frequencies available are in paired bands. With FDD, downlink and uplink traffic is
transmitted simultaneously in separate frequency bands.
With TDD the transmission in uplink and downlink is discontinuous within the same
frequency band. As an example, if the time split between down- and uplink is 1/1, the
uplink is used half of the time. The average power for each link is then also half of the
peak power. As peak power is limited by regulatory requirements, the result is that
for the same peak power, TDD will offer less coverage than FDD.
K025 LTE Technology for Engineers Page 145
LTE Basic Air Interface
4.5.1 FDD
Two frame structure types are defined for E-UTRA: frame structure type 1 for FDD
mode, and frame structure type 2 for TDD mode.
For the frame structure type 1, the 10 ms radio frame is divided into 20 equally sized
slots of 0.5ms. A sub-frame consists of two consecutive slots, so one radio frame
contains ten sub-frames.
Page 146 K025 LTE Technology for Engineers
LTE Basic Air Interface
4.5.2 TDD
The frame structure for the type 2 frames used on LTE TDD is somewhat different.
The 10 ms frame comprises two half frames, each 5 ms long. The LTE half-frames are
further split into five sub-frames, each 1ms long.
With TDD the transmission in uplink and downlink is discontinuous within the same
frequency band. As an example, if the time split between down- and uplink is 1/1, the
uplink is used half of the time. The average power for each link is then also half of the
peak power. As peak power is limited by regulatory requirements, the result is that
for the same peak power, TDD will offer less coverage than FDD.
K025 LTE Technology for Engineers Page 147
LTE Basic Air Interface
The special subframes consist of the three fields:
 DwPTS (Downlink Pilot Timeslot)
 GP (Guard Period)
 UpPTS (Uplink Pilot Timeslot).
The special frames replace what would be a normal sub-frame.
Page 148 K025 LTE Technology for Engineers
LTE Basic Air Interface
The DL to UL switching method ensures that the high power downlink transmissions
from the eNodeB from other neighbour cells do not interfere when the eNodeB UL
reception is going in the current cell.
K025 LTE Technology for Engineers Page 149
LTE Basic Air Interface
4.5.3 LTE TDD / TD-LTE Subframe Allocations
One of the advantages of using LTE TDD is that it is possible to dynamically change
the up and downlink balance and characteristics to meet the load conditions. In order
that this can be achieved in an ordered fashion, a number of standard configurations
have been set within the LTE standards.
A total of seven up/downlink configurations have been set, and these use either 5 ms
or 10 ms switch periodicities. In the case of the 5ms switch point periodicity, a special
sub-frame exists in both half frames. In the case of the 10 ms periodicity, the special
subframe exists in the first half frame only. It can be seen from the table above that the
sub-frames 0 and 5 as well as DwPTS are always reserved for the downlink. It can
also be seen that UpPTS and the sub-frame immediately following the special
subframe are always reserved for the uplink transmission.
Page 150 K025 LTE Technology for Engineers
LTE Basic Air Interface
4.5.4 Flexible Carrier Bandwidths
LTE is defined to support flexible carrier bandwidths from below 1.4MHz up to
20MHz, in many spectrum bands and for both FDD and TDD deployments. This
means that an operator can introduce LTE in both new and existing bands.
K025 LTE Technology for Engineers Page 151
LTE Basic Air Interface
LTE supports a range of bandwidths up to 20 MHz, as depicted above. LTE also
supports devices that can work on various system-bandwidth combinations, therefore
reducing the need to tailor specific device profiles to each combination. This allows an
operator to deploy LTE in 10 or 20 MHz combinations, without worrying about
device-compatibility issues. LTE devices are mandated to support 20 MHz bandwidth
in the DL and the UL. The available peak rates and average user rates for an
individual user, however, scale with the deployment bandwidth.
LTE supports both FDD and TDD modes, allowing operators to address all available
spectrum resources.
Page 152 K025 LTE Technology for Engineers
LTE Basic Air Interface
4.6Slot Structure and Physical Resources
The subcarriers in LTE have a constant spacing of f = 15 kHz. In the frequency
domain, 12 subcarriers form one resource block. The resource block size is the same for
all bandwidths.
To each OFDM symbol, a cyclic prefix (CP) is appended as guard time. One downlink
slot consists of 6 or 7 OFDM symbols, depending on whether extended or normal cyclic
prefix is configured respectively. The extended cyclic prefix is able to cover larger cell
sizes with higher delay spread of the radio channel.
K025 LTE Technology for Engineers Page 153
LTE Basic Air Interface
Data symbols are independently modulated and transmitted over a high number of
closely spaced orthogonal subcarriers. In E-UTRA, downlink modulation schemes
QPSK, 16QAM, and 64QAM are available.
Page 154 K025 LTE Technology for Engineers
LTE Basic Air Interface
K025 LTE Technology for Engineers Page 155
LTE Basic Air Interface
4.6.1 Transmission Bandwidths
LTE must support the international wireless market and regional spectrum
regulations and spectrum availability. To this end the specifications include variable
channel bandwidths selectable from 1.4 to 20 MHz, with subcarrier spacing of 15 kHz.
If the new LTE eMBMS is used, a subcarrier spacing of 7.5 kHz is also possible.
Subcarrier spacing is constant regardless of the channel bandwidth.
3GPP has defined the LTE air interface to be "bandwidth agnostic," which allows the
air interface to adapt to different channel bandwidths with minimal impact on system
operation. The smallest amount of resource that can be allocated in the uplink or
downlink is called a resource block (RB). An RB is 180 kHz wide and lasts for one 0.5
ms timeslot. For standard LTE, an RB comprises 12 subcarriers at a 15 kHz spacing,
and for eMBMS with the optional 7.5 kHz subcarrier spacing an RB comprises 24
subcarriers for 0.5 ms. The maximum number of RBs supported by each transmission
bandwidth is given above.
Page 156 K025 LTE Technology for Engineers
LTE Basic Air Interface
4.7Orthagonality
Depending on the required data rate, each UE can be assigned one or more resource
blocks in each transmission time interval of 1 ms. The scheduling decision is made in
the base station (eNodeB).
K025 LTE Technology for Engineers Page 157
LTE Basic Air Interface
For standard LTE, an RB comprises 12 subcarriers at a 15 kHz spacing, and for
eMBMS with the optional 7.5 kHz subcarrier spacing an RB comprises 24 subcarriers
for 0.5 ms.
Page 158 K025 LTE Technology for Engineers
LTE Basic Air Interface
4.7.1 Single-Frequency Network Multicast Services
LTE specifies a high-capacity multicast and broadcast service, using a single-
frequency network (also called multicast-broadcast single-frequency network or
MBSFN). As depicted above, all cells in the network (or a geographical area) transmit
time-synchronized, identical DL signals. At the user terminal, these multiple time-
synchronized transmissions appear as a single transmission with high signal strength,
and thus can be easily decoded. In addition to the benefits of time-synchronised
transmissions, the robustness of OFDM to multipath propagation ensures that the
inter-cell interference is reduced.
The capacity benefits of the single-frequency network are highest when the same
content is transmitted in all cells of the macro network.
K025 LTE Technology for Engineers Page 159
LTE Basic Air Interface
Page 160 K025 LTE Technology for Engineers
LTE Basic Air Interface
4.7.2 Single Carrier Frequency Division Multiple Access (SC-
FDMA)
LTE has ambitious requirements for data rate, capacity, spectrum efficiency, and
latency. In order to fulfill these requirements, LTE is based on new technical
principles. LTE uses new multiple access schemes on the air interface: OFDMA
(Orthogonal Frequency Division Multiple Access) in downlink and SC-FDMA (Single
Carrier Frequency Division Multiple Access) in uplink.
While OFDMA is seen optimum to fulfil the LTE requirements in downlink, OFDMA
properties are less favourable for the uplink. This is mainly due to weaker peak-to-
average power ratio (PAPR) properties of an OFDMA signal, resulting in worse
uplink coverage.
Thus, the LTE uplink transmission scheme for FDD and TDD mode is based on SC-
FDMA (Single Carrier Frequency Division Multiple Access) with cyclic prefix. SC-FDMA
signals have better PAPR properties compared to an OFDMA signal. This was one of
the main reasons for selecting SCFDMA as LTE uplink access scheme. The PAPR
characteristics are important for cost-effective design of UE power amplifiers.
K025 LTE Technology for Engineers Page 161
LTE Basic Air Interface
Page 162 K025 LTE Technology for Engineers
LTE Basic Air Interface
4.8Cyclic Prefix
In the time domain, a guard interval may be added to each symbol to combat inter-
OFDM-symbol-interference due to channel delay spread. In EUTRA, the guard
interval is a cyclic prefix which is inserted prior to each OFDM symbol.
Delay spread is a type of distortion that is caused when an identical signal arrives at
different times at its destination. The signal usually arrives via multiple paths and
with different angles of arrival. The time difference between the arrival moment of the
first multipath component (typically the Line of sight component) and the last one, is
called delay spread.
K025 LTE Technology for Engineers Page 163
LTE Basic Air Interface
4.9Delay Spread
The data to be transmitted on an OFDM signal is spread across the carriers of the
signal, each carrier taking part of the payload. This reduces the data rate taken by
each carrier. The lower data rate has the advantage that interference from reflections
is much less critical. This is achieved by adding a guard band time or guard interval
into the system. This ensures that the data is only sampled when the signal is stable
and no new delayed signals arrive that would alter the timing and phase of the signal.
The distribution of the data across a large number of carriers in the OFDM signal has
some further advantages. Nulls caused by multi-path effects or interference on a
given frequency only affect a small number of the carriers, the remaining ones being
received correctly. By using error-coding techniques, which does mean adding further
data to the transmitted signal, it enables many or all of the corrupted data to be
reconstructed within the receiver. This can be done because the error correction code
is transmitted in a different part of the signal. It is this error coding which is referred
to in the "Coded" word in the title of COFDM which is often seen.
Page 164 K025 LTE Technology for Engineers
LTE Basic Air Interface
K025 LTE Technology for Engineers Page 165
LTE Basic Air Interface
To each OFDM symbol, a cyclic prefix (CP) is appended as guard time. One downlink
slot consists of 6 or 7 OFDM symbols, depending on whether extended or normal
cyclic prefix is configured, respectively. The extended cyclic prefix is able to cover
larger cell sizes with higher delay spread of the radio channel.
Page 166 K025 LTE Technology for Engineers
LTE Basic Air Interface
4.10 Slot Structure and Physical Resources
Data is allocated to the UEs in terms of resource blocks, i.e. one UE can be allocated
integer multiples of one resource block in the frequency domain. These resource
blocks do not have to be adjacent to each other. In the time domain, the scheduling
decision can be modified every transmission time interval of 1 ms. The scheduling
decision is done in the base station (eNodeB). The scheduling algorithm has to take
into account the radio link quality situation of different users, the overall interference
situation, Quality of Service requirements, service priorities, and so on.
K025 LTE Technology for Engineers Page 167
LTE Basic Air Interface
4.11 Scheduler
Scheduler in eNB (base station) allocates resource blocks (which are the smallest
elements of resource allocation) to users for predetermined amount of time. Slots
consist of either 6 (for long cyclic prefix) or 7 (for short cyclic prefix) OFDM symbols
Longer cyclic prefixes are desired to address longer fading. The number of available
subcarriers changes depending on transmission bandwidth (but subcarrier spacing is
fixed).
Page 168 K025 LTE Technology for Engineers
LTE Basic Air Interface
Round Robin
The aim of this scheduler is to share the available/unused resources equally among
the RT terminals (i.e. the terminals requesting RT services) in order to satisfy their RT-
MBR demand.
This is a recursive algorithm and continues to share resources equally among RT
terminals, until all RT-MBR demands have been met or there are no more resources
left to allocate
Proportional Fair
The aim of this Scheduler is to allocate the available/unused resources as fairly as
possible in such a way that, on average, each terminal gets the highest possible
throughput achievable under the channel conditions.
This is a recursive algorithm. The remaining resources are shared between the RT
terminals in proportion to their bearer data rates. Terminals with higher data rates get
a larger share of the available resources. Each terminal gets either the resources it
needs to satisfy its RT-MBR demand, or its weighted portion of the available/unused
resources, whichever is smaller. This recursive allocation process continues until all
RT-MBR demands have been met or there are no more resources left to allocate.
K025 LTE Technology for Engineers Page 169
LTE Basic Air Interface
Proportional Demand
The aim of this scheduler is to allocate the remaining unused resources to RT
terminals in proportion to their additional resource demands. This is a non-recursive
allocation process and results in either satisfying the RT-MBR demands of all
terminals or the consumption of all of the resources.
Page 170 K025 LTE Technology for Engineers
LTE Basic Air Interface
Max SINR
The aim of this Scheduler is to maximise the terminal throughput and, in turn, the
average cell throughput. This is a non-recursive resource allocation process, where
terminals with higher bearer rates (and consequently higher SINR) are preferred over
terminals with lower bearer rates (and consequently lower SINR). This means that
resources are allocated first to those terminals with better SINR/channel conditions,
thereby maximising the throughput.
K025 LTE Technology for Engineers Page 171
LTE Basic Air Interface
Page 172 K025 LTE Technology for Engineers
LTE Basic Air Interface
4.12 ASSET - LTE
K025 LTE Technology for Engineers Page 173
LTE Basic Air Interface
4.13 Downlink Data Transmission
Data is allocated to the UEs in terms of resource blocks. A physical resource block
consists of 12 (24) consecutive sub-carriers in the frequency domain for the Nf=15 kHz
(Nf=7.5 kHz) case. In the time domain, a physical resource block consists of DL
Nsymb consecutive OFDM symbols, DL Nsymb is equal to the number of OFDM
symbols in a slot.
Depending on the required data rate, each UE can be assigned one or more resource
blocks in each transmission time interval of 1 ms. The scheduling decision is done in
the base station (eNodeB).
Page 174 K025 LTE Technology for Engineers
LTE Basic Air Interface
The user data is carried on the Physical Downlink Shared Channel (PDSCH).
K025 LTE Technology for Engineers Page 175
LTE Basic Air Interface
4.14 Modulation and Subcarriers
Page 176 K025 LTE Technology for Engineers
LTE Basic Air Interface
K025 LTE Technology for Engineers Page 177
LTE Basic Air Interface
4.15 Downlink Reference Signal Structure
Page 178 K025 LTE Technology for Engineers
LTE Basic Air Interface
4.15.1 Configuration of Carrier
K025 LTE Technology for Engineers Page 179
LTE Basic Air Interface
Page 180 K025 LTE Technology for Engineers
LTE Basic Air Interface
K025 LTE Technology for Engineers Page 181
LTE Basic Air Interface
4.16 Reference Signal Received Power (RSRP)
Reference Signal Received Power (RSRP), is determined for a considered cell as the
linear average over the power contributions (in [W]) of the resource elements that
carry cell-specific reference signals within the considered measurement frequency
bandwidth. For RSRP determination, the cell-specific reference signals R0 and, if
available, R1 can be used. If receiver diversity is in use by the UE, the reported value
shall not be lower than the corresponding RSRP of any of the individual diversity
branches.
E-UTRA Carrier RSSI
E-UTRA Carrier Received Signal Strength Indicator, comprises the total received
wideband power observed by the UE from all sources, including co-channel serving
and non-serving cells, adjacent channel interference, thermal noise and so on.
Reference Signal Received Quality (RSRQ)
RSRQ is defined as the ratio N×RSRP / (E-UTRA carrier RSSI), where N is the number
of RBs of the E-UTRA carrier RSSI measurement bandwidth. The measurements in the
numerator and denominator shall be made over the same set of resource blocks.
Page 182 K025 LTE Technology for Engineers
LTE Basic Air Interface
K025 LTE Technology for Engineers Page 183
LTE Basic Air Interface
4.17 Channel Quality Indicator Reporting
Page 184 K025 LTE Technology for Engineers
LTE Basic Air Interface
K025 LTE Technology for Engineers Page 185
LTE Basic Air Interface
Page 186 K025 LTE Technology for Engineers
LTE Basic Air Interface
K025 LTE Technology for Engineers Page 187
LTE Basic Air Interface
4.18 Downlink Shared Channel (DL-SCH)
Page 188 K025 LTE Technology for Engineers
LTE Basic Air Interface
4.18.1 Physical Cell Identity (PCI)
K025 LTE Technology for Engineers Page 189
LTE Basic Air Interface
4.18.2 Physical Downlink Control Channel
Page 190 K025 LTE Technology for Engineers
LTE Basic Air Interface
4.19 Questions
K025 LTE Technology for Engineers Page 191
LTE Network Architecture and Protocols
5 LTE Network
Architecture and
Protocols
C H A P T E R 5
Page 192 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
5.1LTE Architecture
LTE capabilities include:
 Downlink peak data rates up to 326 Mbps with 20 MHz bandwidth.
 Uplink peak data rates up to 86.4 Mbps with 20 MHz bandwidth.
 Operation in both TDD and FDD modes.
 Scalable bandwidth up to 20 MHz, covering 1.25, 2.5, 5, 10, 15, and 20 MHz in the
study phase.
 Reduced latency, to 10 msec round-trip time between user equipment and the base
station, and to less than 100 msec transition time from inactive to active.
The overall intent is to provide an extremely high-performance radio-access
technology that offers full vehicular speed mobility and that can readily coexist with
HSPA and earlier networks. Because of scalable bandwidth, operators will be able to
easily migrate their networks and users from HSPA to LTE over time.
K025 LTE Technology for Engineers Page 193
LTE Network Architecture and Protocols
Page 194 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 195
LTE Network Architecture and Protocols
5.2Roaming Architecture
A network run by one operator in one country is known as a Public Land Mobile
Network (PLMN). Roaming is where users are allowed to connect to PLMNs other
than those to which they are directly subscribed.
Page 196 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 197
LTE Network Architecture and Protocols
Page 198 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 199
LTE Network Architecture and Protocols
5.3Bearer Establishment Procedure
Page 200 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 201
LTE Network Architecture and Protocols
Page 202 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 203
LTE Network Architecture and Protocols
Page 204 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
5.4KPI-RAB Success
K025 LTE Technology for Engineers Page 205
LTE Network Architecture and Protocols
5.5KPI – Dropped Call Ratio
Page 206 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
Radio Bearer Reconfiguration procedure allows the modification of the following
parameters:
DRX/DTX Re-configuration for UE in RRC_CONNECTED state (Radio Bearer
Reconfiguration procedure is used to reconfigure the RRC Connection.)
Modification of QoS parameters (QoS parameters are listed below).
 Modification of long lived PRB allocation
 Modification of fixed MCS allocation
QoS definitions for Radio Bearers which can be modified are listed below:
 QoS-Label/ QoS Profile ID
 UL Guaranteed Bit rate[1]GBR
 UL Maximum Bit rate[2]
 DL Guaranteed Bit rate GBR
 DL Maximum Bit rate
 Allocation / Retention Priority
[1] Guaranteed bit rate (GBR) specifies the guaranteed number of bits delivered by E-
UTRA within a period of time (provided there is data to deliver).
[2] Maximum bit rate (MBR) specifies a maximum number of bits delivered by UMTS
within a period of time
K025 LTE Technology for Engineers Page 207
LTE Network Architecture and Protocols
Page 208 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 209
LTE Network Architecture and Protocols
Page 210 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
5.6The Home Subscriber Service
The HSS contains users’ SAE subscription data such as the EPS-subscribed QoS
profile and any access restrictions for roaming. It also holds information about the
PDNs to which the user can connect.
This could be in the form of an Access Point Name (APN) (which is a label according
to DNS1 naming conventions describing the access point to the PDN), or a PDN
Address (indicating subscribed IP address(es)). In addition, the HLR holds dynamic
information such as the identity of the MME to which the user is currently attached or
registered. The HLR may also integrate the Authentication Centre (AuC) which
generates the vectors for authentication and security keys.
Security functions are the responsibility of the MME for both signalling and user data.
When a UE attaches with the network, a mutual authentication of the UE and the
network is performed between the UE and the MME/HSS. This authentication
function also establishes the security keys which are used for encryption of the
bearers.
All data sent over the radio interface is encrypted
K025 LTE Technology for Engineers Page 211
LTE Network Architecture and Protocols
Page 212 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
5.7PDN Gateway
K025 LTE Technology for Engineers Page 213
LTE Network Architecture and Protocols
Page 214 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 215
LTE Network Architecture and Protocols
Page 216 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 217
LTE Network Architecture and Protocols
5.8Network Sharing
The LTE architecture enables service providers to reduce the cost of owning and
operating the network by allowing the service providers to have separate CN (MME,
SGW, PDN GW) while the E-UTRAN (eNBs) is jointly shared by them. This is enabled
by the S1-flex mechanism by enabling each eNB to be connected to multiple CN
entities. When a UE attaches to the network, it is connected to the appropriate CN
entities based on the identity of the service provider sent by the UE.
Page 218 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 219
LTE Network Architecture and Protocols
5.9Session Initiation Protocol Architecture
Page 220 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 221
LTE Network Architecture and Protocols
Page 222 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 223
LTE Network Architecture and Protocols
Page 224 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
5.10 LTE Functional Nodes
Radio Resource Management:
Radio Bearer Control, Radio Admission Control, Connection
Bearer control is the allocation of resources to the UE, so the number of sub carriers,
coding scheme, power levels and so on.
Mobility Control, Dynamic allocation of resources to UEs in both UL and DL
(scheduling).
Mobility control includes handovers, which can now be achieved in some LTE cases
without the need for any decision making (and minimal signalling) by the Core
Network.
The allocation of resources to the UE includes the number of sub carriers, coding
scheme, power levels and so on. Obviously, this includes load sharing, enabling
everyone in the cell to get appropriate resources depending on the number of users in
the cell and cell capacity.
IP header compression and encryption of user data stream.
Header compression allows more user data information to be sent rather than using
resources. The purpose of IP header compression algorithm is to improve the ratio of
the overhead versus the payload for an IP packet. It is of tremendous importance
since the increase of the address space when shifting to IPv6 translates into an
increase of the header size.
K025 LTE Technology for Engineers Page 225
LTE Network Architecture and Protocols
All data will be encrypted for over the air transmission, ensuring user confidentiality.
Scheduling and transmission of paging messages (from the MME);
A UE will have to be paged when there is data to send to it or when an incoming
phone call is being made.
mobility and scheduling.
UEs inform the network which cells it is receiving and the power level and quality of
those signals. The eNB can provide the UE assistance, by providing a list of
frequencies, scrambling codes (UTRAN) etc, and perhaps even a list of preferred
networks and specific frequencies to measure. We will talk more about this later.
Page 226 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 227
LTE Network Architecture and Protocols
5.11 Physical Channels, Transport Channels &
Logical Channels
Page 228 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
5.11.1 Logical Channels
K025 LTE Technology for Engineers Page 229
LTE Network Architecture and Protocols
Page 230 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 231
LTE Network Architecture and Protocols
5.11.2 Transport Channels
The LTE transport channels vary between the uplink and the downlink, as each has
different requirements and operates in a different manner. Physical layer transport
channels offer information transfer to medium access control (MAC) and higher
layers.
Broadcast Channel (BCH): The LTE transport channel maps to Broadcast Control
Channel (BCCH)
Downlink Shared Channel (DL-SCH):This transport channel is the main channel for
downlink data transfer. It is used by many logical channels.
Paging Channel (PCH): To convey the PCCH
Multicast Channel (MCH): This transport channel is used to transmit MCCH information
to set up multicast transmissions
Page 232 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
Downlink Transport Channels
BCH (Broadcast Channel): It has a fixed transport format, provided by the specifications.
It is used for transmission of the information on the BCCH logical channel. It can be
characterised by fixed, predefined transport format and the requirement to be
broadcast in the entire coverage area of the cell.
DLSCH (Downlink Shared Channel): DL-SCH is the transport channel used for
transmission of downlink data in LTE. It supports LTE features such as dynamic rate
adaptation and channel dependent scheduling in the time and frequency domain,
hybrid ARQ, and spatial multiplexing.
PCH (Paging Channel): It is used for transmission of paging information on the PCCH
logical channel. The PCH supports DRX to allow the mobile terminal to save battery
power by sleeping and waking up to receive the PCH only at predefined time
instances.
MCH (Multicast Channel): It is used to support MBMS. It is characterised by a semi-static
transport format and semi-static scheduling. In case of multi-cell transmission using
MBSFN, the scheduling and transport format configuration is coordinated among the
cells involved in the MBSFN transmission
Uplink Transport Channels UL-SCH (Uplink Shared Channel): It is characterised by the
possibility to use beamforming; support for HARQ, dynamic link adaptation by
varying the transmit power and potentially modulation and coding and also for both
dynamic and semi-static resource allocation.
RACH (Random Access Channel(s)): It is characterised by limited control information and
collision risk. The possibility of using open loop power control depends on the
physical layer solution.
K025 LTE Technology for Engineers Page 233
LTE Network Architecture and Protocols
Page 234 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 235
LTE Network Architecture and Protocols
5.11.3 Physical Channels
PBCH (Physical Broadcast Channel):
The coded BCH transport block is mapped to four subframes within a 40 ms interval.
This 40 ms timing is blindly detected, i.e. there is no explicit signalling indicating 40
ms timing. Each subframe is assumed to be self-decodable, i.e. the BCH can be
decoded from a single reception, assuming sufficiently good channel conditions.
Page 236 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
Physical Broadcast Channel (PBCH): This physical channel carries system information for
UEs requiring to access the network.
Physical Downlink Control Channel (PDCCH): The main purpose of this physical channel is
to carry mainly scheduling information.
Physical Hybrid ARQ Indicator Channel (PHICH): As the name implies, this channel is used
to report the Hybrid ARQ status.
Physical Downlink Shared Channel (PDSCH): This channel is used for unicast and paging
functions.
Physical Multicast Channel (PMCH): This physical channel carries system information for
multicast purposes.
Physical Control Format Indicator Channel (PCFICH): This provides information to enable
the UEs to decode the PDSCH
K025 LTE Technology for Engineers Page 237
LTE Network Architecture and Protocols
Page 238 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
5.12 Modulation and Coding
K025 LTE Technology for Engineers Page 239
LTE Network Architecture and Protocols
5.12.1 PDSCH
Page 240 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 241
LTE Network Architecture and Protocols
5.12.2 PUSCH
PUSCH (Physical Uplink Shared Channel): Carries the UL-SCH data, CQI, PMI and RI.
RI (Rank Indicator): RI indicates the number of spatial layers that can be supported by
the UE, based on the channel conditions. The transmission rank selected to be used is
dependent on RI as well as other factors (depending on the vendor) such as traffic
pattern, available transmission bandwidth and so on. RI is compulsory for both open
and closed loop spatial multiplexing.
PMI (Precoding Matrix Indicator): PMI ensures that the correct spatial domain precoding
matrix is applied by the eNodeB so that the transmitted signal matches with the
spatial channel experienced by the UE. It is denoted by the Transmit Precoding Matrix
Indicator (TPMI) that consists of 3 bit or 6 bit information field for 2 or 4 transmit
antennas, respectively. It is compulsory for closed loop spatial multiplexing.
CQI (Channel Quality Indicator): It is a 4 bit index pointing into a table of 16 different
modulation and coding schemes. It indicates or suggests a combination of modulation
and coding scheme that the eNodeB should use to ensure that the BLER (Block Error
Ratio) experienced by the UE remains less than 10%.
Page 242 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
5.13 Functional Nodes
K025 LTE Technology for Engineers Page 243
LTE Network Architecture and Protocols
5.13.1 Functional Nodes - UE
Page 244 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
5.13.2 Functional Nodes - eNodeB
K025 LTE Technology for Engineers Page 245
LTE Network Architecture and Protocols
5.14 RLC Modes
Page 246 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
5.14.1 RLC Modes - Qos
K025 LTE Technology for Engineers Page 247
LTE Network Architecture and Protocols
5.15 Medium Access Control (MAC)
PDCCH (Physical Downlink Control Channel): Informs the UE about the resource allocation
of PCH and DL-SCH, and Hybrid ARQ information related to DL-SCH. It also carries
the uplink scheduling grant. The downlink control signalling (PDCCH) is located in
the first n OFDM symbols where n ≤ 3 and consists of:
 Transport format, resource allocation, and hybrid-ARQ information related to DL-
SCH, and PCH
 Transport format, resource allocation, and hybrid-ARQ information related to UL-
SCH
 QPSK modulation is used for all control channels
Page 248 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
QoS differentiation, i.e. prioritisation of different services according to their
requirements becomes extremely important when the system load gets higher. The
most relevant parameters of QoS classes are:
Transfer Delay: This represents how delay-sensitive the traffic is. For example, the VoIP
class is meant for very delay sensitive traffic, while the P2P File Sharing class is delay-
insensitive.
Guaranteed Bit rate: Delay sensitive QoS Classes have guaranteed bit rate requirements.
This defines the minimum bearer bit rate that the E-UTRAN must provide and it can
be used in admission control and in resource allocation. Each guaranteed bit rate
service also has a maximum bit rate demand, i.e. it can't exceed this limit.
Allocation and Retention Priority (ARP): Within each QoS class there are different
allocation and retention priorities. The primary purpose of ARP is to decide whether a
bearer establishment/modification request can be accepted or needs to be rejected in
case of resource limitations (typically available radio capacity in case of GBR bearers).
In addition, the ARP can be used (for example, by the eNodeB) to decide which
bearer(s) to drop during exceptional resource limitations (for example, at handover).
It is important to remember that pure prioritisation in packet scheduling alone is not
enough to provide full QoS differentiation gains. Users within the same QoS class and
ARP class will share the available capacity. If the number of users is simply too high,
then they will suffer from bad quality. In that case it is better to block a few users to
guarantee the quality of existing connections, like streaming videos.
The radio network can estimate the available radio capacity and block an incoming
user.
K025 LTE Technology for Engineers Page 249
LTE Network Architecture and Protocols
Page 250 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 251
LTE Network Architecture and Protocols
5.16 Physical Control Channel
Page 252 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
5.16.1 Physical Downlink Control Channel
K025 LTE Technology for Engineers Page 253
LTE Network Architecture and Protocols
Page 254 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 255
LTE Network Architecture and Protocols
Page 256 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
PCFICH (Physical Control Format Indicator Channel): Informs the UE about the number of
OFDM symbols used for the PDCCHs. It is transmitted in every subframe.
K025 LTE Technology for Engineers Page 257
LTE Network Architecture and Protocols
5.17 Multimedia Broadcast/Multicast Service
(MBMS)
Page 258 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 259
LTE Network Architecture and Protocols
Page 260 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 261
LTE Network Architecture and Protocols
Page 262 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 263
LTE Network Architecture and Protocols
Page 264 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
5.18 Reference Signal Received Power (RSRP)
Physical Layer Measurements and Indicators
Reference Signal Received Power (RSRP), is determined for a considered cell as the
linear average over the power contributions (in [W]) of the resource elements that
carry cell-specific reference signals within the considered measurement frequency
bandwidth. For RSRP determination, the cell-specific reference signals R0 and, if
available, R1 can be used. If receiver diversity is in use by the UE, the reported value
shall not be lower than the corresponding RSRP of any of the individual diversity
branches.
E-UTRA Carrier RSSI
E-UTRA Carrier Received Signal Strength Indicator, comprises the total received
wideband power observed by the UE from all sources, including co-channel serving
and non-serving cells, adjacent channel interference, thermal noise and so on.
Reference Signal Received Quality (RSRQ)
RSRQ is defined as the ratio N×RSRP / (E-UTRA carrier RSSI), where N is the number
of RB’s of the E-UTRA carrier RSSI measurement bandwidth. The measurements in
the numerator and denominator shall be made over the same set of resource blocks.
K025 LTE Technology for Engineers Page 265
LTE Network Architecture and Protocols
Page 266 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
5.19 Quality Channel Indicator Reporting
K025 LTE Technology for Engineers Page 267
LTE Network Architecture and Protocols
Page 268 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 269
LTE Network Architecture and Protocols
Page 270 K025 LTE Technology for Engineers
LTE Network Architecture and Protocols
K025 LTE Technology for Engineers Page 271
Mobility Management
6 Mobility Management
6.1UE States
C H A P T E R 6
Page 272 K025 LTE Technology for Engineers
Mobility Management
Co-existence with legacy standards and systems: LTE users should be able to make voice
calls from their terminal and have access to basic data services even when they are in
areas without LTE coverage. LTE therefore allows smooth, seamless service handover
in areas of HSPA, WCDMA or GSM/GPRS/EDGE coverage. Furthermore, LTE/SAE
supports not only intra-system and intersystem handovers, but inter-domain
handovers between packet switched and circuit switched sessions.
K025 LTE Technology for Engineers Page 273
Mobility Management
6.2UE Power-up
Page 274 K025 LTE Technology for Engineers
Mobility Management
K025 LTE Technology for Engineers Page 275
Mobility Management
6.2.1 EPS Mobility Management
Page 276 K025 LTE Technology for Engineers
Mobility Management
K025 LTE Technology for Engineers Page 277
Mobility Management
6.2.2 Tracking Area Update
Page 278 K025 LTE Technology for Engineers
Mobility Management
K025 LTE Technology for Engineers Page 279
Mobility Management
6.3LTE Functional Modes - MME
Page 280 K025 LTE Technology for Engineers
Mobility Management
K025 LTE Technology for Engineers Page 281
Mobility Management
Page 282 K025 LTE Technology for Engineers
Mobility Management
6.4RRC States
In order to provide seamless service continuity, ensuring mobility between LTE and
legacy technologies is therefore very important. These technologies include
GSM/GPRS and WCDMA/HSPA.
K025 LTE Technology for Engineers Page 283
Mobility Management
Page 284 K025 LTE Technology for Engineers
Mobility Management
K025 LTE Technology for Engineers Page 285
Mobility Management
Page 286 K025 LTE Technology for Engineers
Mobility Management
K025 LTE Technology for Engineers Page 287
Mobility Management
Page 288 K025 LTE Technology for Engineers
Mobility Management
K025 LTE Technology for Engineers Page 289
Mobility Management
Page 290 K025 LTE Technology for Engineers
Mobility Management
K025 LTE Technology for Engineers Page 291
Mobility Management
Page 292 K025 LTE Technology for Engineers
Mobility Management
K025 LTE Technology for Engineers Page 293
Mobility Management
Page 294 K025 LTE Technology for Engineers
Mobility Management
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers
Lte technology-for-engineers

Weitere ähnliche Inhalte

Was ist angesagt?

4 td lte(ᶺà¿-) (1)
4 td lte(ᶺà¿-) (1)4 td lte(ᶺà¿-) (1)
4 td lte(ᶺà¿-) (1)mnajib171
 
3gpp architecture evolution
3gpp architecture evolution3gpp architecture evolution
3gpp architecture evolutionphilip habib
 
4 g(lte) principle and key technology training and certificate 2
4 g(lte) principle and key technology training and certificate 24 g(lte) principle and key technology training and certificate 2
4 g(lte) principle and key technology training and certificate 2Taiz Telecom
 
LTE Long Term Evolution
LTE Long Term EvolutionLTE Long Term Evolution
LTE Long Term Evolutionajus ady
 
Nokia Siemens Networks Lte Analyst Webcast Dec10
Nokia Siemens Networks  Lte Analyst Webcast Dec10Nokia Siemens Networks  Lte Analyst Webcast Dec10
Nokia Siemens Networks Lte Analyst Webcast Dec10Sylwia Boguszewska
 
LTE Basic Principle
LTE Basic PrincipleLTE Basic Principle
LTE Basic PrincipleTaiz Telecom
 
Long term evolution (lte) technology
Long term evolution (lte) technologyLong term evolution (lte) technology
Long term evolution (lte) technologykonan23
 
LTE - 3GPP Standard Perspective
LTE - 3GPP Standard PerspectiveLTE - 3GPP Standard Perspective
LTE - 3GPP Standard PerspectiveMuhannad Aulama
 
Overview lte
Overview lteOverview lte
Overview lteProcExpl
 
A comparative study of wimax and lte
A comparative study of wimax and lteA comparative study of wimax and lte
A comparative study of wimax and lteHanie Salim
 
LTE- Long Term Evolution
LTE- Long Term EvolutionLTE- Long Term Evolution
LTE- Long Term EvolutionRazib Bondu
 

Was ist angesagt? (20)

Lte
LteLte
Lte
 
4 td lte(ᶺà¿-) (1)
4 td lte(ᶺà¿-) (1)4 td lte(ᶺà¿-) (1)
4 td lte(ᶺà¿-) (1)
 
3gpp architecture evolution
3gpp architecture evolution3gpp architecture evolution
3gpp architecture evolution
 
4 g(lte) principle and key technology training and certificate 2
4 g(lte) principle and key technology training and certificate 24 g(lte) principle and key technology training and certificate 2
4 g(lte) principle and key technology training and certificate 2
 
LTE Long Term Evolution
LTE Long Term EvolutionLTE Long Term Evolution
LTE Long Term Evolution
 
Nokia Siemens Networks Lte Analyst Webcast Dec10
Nokia Siemens Networks  Lte Analyst Webcast Dec10Nokia Siemens Networks  Lte Analyst Webcast Dec10
Nokia Siemens Networks Lte Analyst Webcast Dec10
 
LTE Basic Principle
LTE Basic PrincipleLTE Basic Principle
LTE Basic Principle
 
Long term evolution (lte) technology
Long term evolution (lte) technologyLong term evolution (lte) technology
Long term evolution (lte) technology
 
Introduction to LTE
Introduction to LTEIntroduction to LTE
Introduction to LTE
 
Lte basics
Lte basicsLte basics
Lte basics
 
LTE: Introduction, evolution and testing
LTE: Introduction, evolution and testingLTE: Introduction, evolution and testing
LTE: Introduction, evolution and testing
 
LTE - 3GPP Standard Perspective
LTE - 3GPP Standard PerspectiveLTE - 3GPP Standard Perspective
LTE - 3GPP Standard Perspective
 
Lte s6 sip_678_10_09
Lte s6 sip_678_10_09Lte s6 sip_678_10_09
Lte s6 sip_678_10_09
 
Overview lte
Overview lteOverview lte
Overview lte
 
1 tmo18023 umts overview
1 tmo18023 umts overview1 tmo18023 umts overview
1 tmo18023 umts overview
 
LTE Basic
LTE BasicLTE Basic
LTE Basic
 
A comparative study of wimax and lte
A comparative study of wimax and lteA comparative study of wimax and lte
A comparative study of wimax and lte
 
LTE- Long Term Evolution
LTE- Long Term EvolutionLTE- Long Term Evolution
LTE- Long Term Evolution
 
Long Term Evolution (LTE)
Long Term Evolution (LTE)Long Term Evolution (LTE)
Long Term Evolution (LTE)
 
LTE Engg Seminar
LTE Engg SeminarLTE Engg Seminar
LTE Engg Seminar
 

Andere mochten auch

Volte and LTE technology (Reliance Jio)
Volte and LTE technology (Reliance Jio)Volte and LTE technology (Reliance Jio)
Volte and LTE technology (Reliance Jio)Urvi Sharma
 
BII The Internet Of Everything 2015
BII The Internet Of Everything 2015 BII The Internet Of Everything 2015
BII The Internet Of Everything 2015 BI Intelligence
 
Mobile communication
Mobile communicationMobile communication
Mobile communicationsourabh kant
 
4g technology seminar ppt
4g technology seminar ppt4g technology seminar ppt
4g technology seminar pptShreya Thakur
 
ppt on 4g
ppt on 4gppt on 4g
ppt on 4gPPT4U
 
Telecommunication basics
Telecommunication basicsTelecommunication basics
Telecommunication basicsYoohyun Kim
 
Apple & Samsung Marketing Strategy
Apple & Samsung Marketing StrategyApple & Samsung Marketing Strategy
Apple & Samsung Marketing StrategyRavildjan
 
Long term evolution (lte) technology
Long term evolution (lte) technologyLong term evolution (lte) technology
Long term evolution (lte) technologyGhanshyam Mishra
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology EssentialsHussien Mahmoud
 
Mobile communication intro
Mobile communication introMobile communication intro
Mobile communication introTHANDAIAH PRABU
 
Lte Presentation.Ppt
Lte Presentation.PptLte Presentation.Ppt
Lte Presentation.Pptvaimalik
 

Andere mochten auch (16)

4G technology
4G technology4G technology
4G technology
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
Mobile communication
Mobile communication Mobile communication
Mobile communication
 
Volte and LTE technology (Reliance Jio)
Volte and LTE technology (Reliance Jio)Volte and LTE technology (Reliance Jio)
Volte and LTE technology (Reliance Jio)
 
BII The Internet Of Everything 2015
BII The Internet Of Everything 2015 BII The Internet Of Everything 2015
BII The Internet Of Everything 2015
 
3g 4g ppt
3g 4g ppt3g 4g ppt
3g 4g ppt
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
4G technology
4G technology 4G technology
4G technology
 
4g technology seminar ppt
4g technology seminar ppt4g technology seminar ppt
4g technology seminar ppt
 
ppt on 4g
ppt on 4gppt on 4g
ppt on 4g
 
Telecommunication basics
Telecommunication basicsTelecommunication basics
Telecommunication basics
 
Apple & Samsung Marketing Strategy
Apple & Samsung Marketing StrategyApple & Samsung Marketing Strategy
Apple & Samsung Marketing Strategy
 
Long term evolution (lte) technology
Long term evolution (lte) technologyLong term evolution (lte) technology
Long term evolution (lte) technology
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology Essentials
 
Mobile communication intro
Mobile communication introMobile communication intro
Mobile communication intro
 
Lte Presentation.Ppt
Lte Presentation.PptLte Presentation.Ppt
Lte Presentation.Ppt
 

Ähnlich wie Lte technology-for-engineers

4G LTE full tutorial
4G LTE full tutorial4G LTE full tutorial
4G LTE full tutorialAfzaal Anwar
 
3GPP_4G to 5G networks evolution and releases.pdf
3GPP_4G to 5G networks evolution and releases.pdf3GPP_4G to 5G networks evolution and releases.pdf
3GPP_4G to 5G networks evolution and releases.pdfXinHuang548256
 
Carrier Aggregation in LTE Releases3rd Generation Partnership Proj.docx
Carrier Aggregation in LTE Releases3rd Generation Partnership Proj.docxCarrier Aggregation in LTE Releases3rd Generation Partnership Proj.docx
Carrier Aggregation in LTE Releases3rd Generation Partnership Proj.docxannandleola
 
LTE (4G) PROJECT REPORT
LTE (4G) PROJECT REPORTLTE (4G) PROJECT REPORT
LTE (4G) PROJECT REPORTkantkamal2291
 
Lte Advancedtechnologyintroduction 100401143915 Phpapp01
Lte Advancedtechnologyintroduction 100401143915 Phpapp01Lte Advancedtechnologyintroduction 100401143915 Phpapp01
Lte Advancedtechnologyintroduction 100401143915 Phpapp01Deepak Sharma
 
Nokia lte advanced evolution white_paper
Nokia lte advanced evolution white_paperNokia lte advanced evolution white_paper
Nokia lte advanced evolution white_paperssk
 
The second phase of lte advanced lte-b 30-fold capacity boosting to lte
The second phase of lte advanced lte-b  30-fold capacity boosting to lteThe second phase of lte advanced lte-b  30-fold capacity boosting to lte
The second phase of lte advanced lte-b 30-fold capacity boosting to ltessk
 
3 g lte long term evolution tutorial
3 g lte long term evolution tutorial3 g lte long term evolution tutorial
3 g lte long term evolution tutorialwaaway
 
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels senthil krishnan
 
LTE @ Yogyakarta, 19 December 2001
LTE @ Yogyakarta, 19 December 2001LTE @ Yogyakarta, 19 December 2001
LTE @ Yogyakarta, 19 December 2001Arief Gunawan
 
lterazibmollick-121105203743-phpapp01 (1).ppt
lterazibmollick-121105203743-phpapp01 (1).pptlterazibmollick-121105203743-phpapp01 (1).ppt
lterazibmollick-121105203743-phpapp01 (1).pptmahmoudsafaei1987
 
LTE Protocol Overview EMERSON EDUARDO RODRIGUES
LTE Protocol Overview EMERSON EDUARDO RODRIGUESLTE Protocol Overview EMERSON EDUARDO RODRIGUES
LTE Protocol Overview EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
18094043-LTE-Protocol-Overview.pdf
18094043-LTE-Protocol-Overview.pdf18094043-LTE-Protocol-Overview.pdf
18094043-LTE-Protocol-Overview.pdfMohamedShabana37
 

Ähnlich wie Lte technology-for-engineers (20)

4G LTE full tutorial
4G LTE full tutorial4G LTE full tutorial
4G LTE full tutorial
 
3GPP_4G to 5G networks evolution and releases.pdf
3GPP_4G to 5G networks evolution and releases.pdf3GPP_4G to 5G networks evolution and releases.pdf
3GPP_4G to 5G networks evolution and releases.pdf
 
LTE-White-Paper EMERSON EDUARDO RODRIGUES
LTE-White-Paper EMERSON EDUARDO RODRIGUESLTE-White-Paper EMERSON EDUARDO RODRIGUES
LTE-White-Paper EMERSON EDUARDO RODRIGUES
 
LTE, LTE-A and 5G
LTE, LTE-A and 5GLTE, LTE-A and 5G
LTE, LTE-A and 5G
 
Carrier Aggregation in LTE Releases3rd Generation Partnership Proj.docx
Carrier Aggregation in LTE Releases3rd Generation Partnership Proj.docxCarrier Aggregation in LTE Releases3rd Generation Partnership Proj.docx
Carrier Aggregation in LTE Releases3rd Generation Partnership Proj.docx
 
LTE (4G) PROJECT REPORT
LTE (4G) PROJECT REPORTLTE (4G) PROJECT REPORT
LTE (4G) PROJECT REPORT
 
Ppt2
Ppt2Ppt2
Ppt2
 
Lte Advancedtechnologyintroduction 100401143915 Phpapp01
Lte Advancedtechnologyintroduction 100401143915 Phpapp01Lte Advancedtechnologyintroduction 100401143915 Phpapp01
Lte Advancedtechnologyintroduction 100401143915 Phpapp01
 
Nokia lte advanced evolution white_paper
Nokia lte advanced evolution white_paperNokia lte advanced evolution white_paper
Nokia lte advanced evolution white_paper
 
The second phase of lte advanced lte-b 30-fold capacity boosting to lte
The second phase of lte advanced lte-b  30-fold capacity boosting to lteThe second phase of lte advanced lte-b  30-fold capacity boosting to lte
The second phase of lte advanced lte-b 30-fold capacity boosting to lte
 
3 g lte long term evolution tutorial
3 g lte long term evolution tutorial3 g lte long term evolution tutorial
3 g lte long term evolution tutorial
 
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
 
LTE @ Yogyakarta, 19 December 2001
LTE @ Yogyakarta, 19 December 2001LTE @ Yogyakarta, 19 December 2001
LTE @ Yogyakarta, 19 December 2001
 
lterazibmollick-121105203743-phpapp01 (1).ppt
lterazibmollick-121105203743-phpapp01 (1).pptlterazibmollick-121105203743-phpapp01 (1).ppt
lterazibmollick-121105203743-phpapp01 (1).ppt
 
CTIA 2010 LTE Femtocell
CTIA 2010 LTE FemtocellCTIA 2010 LTE Femtocell
CTIA 2010 LTE Femtocell
 
3 gpp – overview
3 gpp – overview3 gpp – overview
3 gpp – overview
 
Launch a Successful LTE Footprints in Bangladesh
Launch a Successful LTE Footprints in BangladeshLaunch a Successful LTE Footprints in Bangladesh
Launch a Successful LTE Footprints in Bangladesh
 
Lte By Aziz
Lte By AzizLte By Aziz
Lte By Aziz
 
LTE Protocol Overview EMERSON EDUARDO RODRIGUES
LTE Protocol Overview EMERSON EDUARDO RODRIGUESLTE Protocol Overview EMERSON EDUARDO RODRIGUES
LTE Protocol Overview EMERSON EDUARDO RODRIGUES
 
18094043-LTE-Protocol-Overview.pdf
18094043-LTE-Protocol-Overview.pdf18094043-LTE-Protocol-Overview.pdf
18094043-LTE-Protocol-Overview.pdf
 

Mehr von a8us

Open mic on ibm notes traveler best practices
Open mic on ibm notes traveler best practicesOpen mic on ibm notes traveler best practices
Open mic on ibm notes traveler best practicesa8us
 
Connect2013 show100 making traveler highly available_part1_traveler design
Connect2013 show100 making traveler highly available_part1_traveler designConnect2013 show100 making traveler highly available_part1_traveler design
Connect2013 show100 making traveler highly available_part1_traveler designa8us
 
Connect2014 id600 ibm notes traveler 2013 & beyond
Connect2014 id600 ibm notes traveler 2013 & beyondConnect2014 id600 ibm notes traveler 2013 & beyond
Connect2014 id600 ibm notes traveler 2013 & beyonda8us
 
Connect 2013 show101 making ibm traveler high available_part2_extending and s...
Connect 2013 show101 making ibm traveler high available_part2_extending and s...Connect 2013 show101 making ibm traveler high available_part2_extending and s...
Connect 2013 show101 making ibm traveler high available_part2_extending and s...a8us
 
Connect ed2015 mas101_user blast 2015
Connect ed2015 mas101_user blast 2015Connect ed2015 mas101_user blast 2015
Connect ed2015 mas101_user blast 2015a8us
 
Connect ed2015 it must be notes, must be something else
Connect ed2015 it must be notes, must be something elseConnect ed2015 it must be notes, must be something else
Connect ed2015 it must be notes, must be something elsea8us
 
Connect ed2014 ad501_ibm worklight for ibm domino developers
Connect ed2014 ad501_ibm worklight for ibm domino developersConnect ed2014 ad501_ibm worklight for ibm domino developers
Connect ed2014 ad501_ibm worklight for ibm domino developersa8us
 
Connect ed2015 bp104_ibm notes traveler daily business-administration monitor...
Connect ed2015 bp104_ibm notes traveler daily business-administration monitor...Connect ed2015 bp104_ibm notes traveler daily business-administration monitor...
Connect ed2015 bp104_ibm notes traveler daily business-administration monitor...a8us
 
Matnewman ibm notes tip of the day traveler 9.0.1.1
Matnewman ibm notes tip of the day traveler 9.0.1.1Matnewman ibm notes tip of the day traveler 9.0.1.1
Matnewman ibm notes tip of the day traveler 9.0.1.1a8us
 
Sametime meetings task reference
Sametime meetings task referenceSametime meetings task reference
Sametime meetings task referencea8us
 
Sametime communicate task reference
Sametime communicate task referenceSametime communicate task reference
Sametime communicate task referencea8us
 
Open mic on sametime 9 installs best practices, tips and tricks
Open mic on sametime 9 installs best practices, tips and tricksOpen mic on sametime 9 installs best practices, tips and tricks
Open mic on sametime 9 installs best practices, tips and tricksa8us
 
Lcty2010 paris so11_sametime 8.5
Lcty2010 paris so11_sametime 8.5Lcty2010 paris so11_sametime 8.5
Lcty2010 paris so11_sametime 8.5a8us
 
Instant chime plugin_installation_guide_for_ibm_sametime_9
Instant chime plugin_installation_guide_for_ibm_sametime_9Instant chime plugin_installation_guide_for_ibm_sametime_9
Instant chime plugin_installation_guide_for_ibm_sametime_9a8us
 
Ibm sametime deployment planning open mic webcast
Ibm sametime deployment planning open mic webcastIbm sametime deployment planning open mic webcast
Ibm sametime deployment planning open mic webcasta8us
 
Ibm sametime 9 for social communications
Ibm sametime 9 for social communicationsIbm sametime 9 for social communications
Ibm sametime 9 for social communicationsa8us
 
Ibm sametime 9 complete basic features installation from zero to hero
Ibm sametime 9 complete basic features installation from zero to heroIbm sametime 9 complete basic features installation from zero to hero
Ibm sametime 9 complete basic features installation from zero to heroa8us
 
Deploying ibm sametime 9 on aix 7.1
Deploying ibm sametime 9 on aix 7.1Deploying ibm sametime 9 on aix 7.1
Deploying ibm sametime 9 on aix 7.1a8us
 
Architecting an ibm sametime 9.0 audio visual deployment
Architecting an ibm sametime 9.0 audio visual deploymentArchitecting an ibm sametime 9.0 audio visual deployment
Architecting an ibm sametime 9.0 audio visual deploymenta8us
 
Call and video calls task reference
Call and video calls task referenceCall and video calls task reference
Call and video calls task referencea8us
 

Mehr von a8us (20)

Open mic on ibm notes traveler best practices
Open mic on ibm notes traveler best practicesOpen mic on ibm notes traveler best practices
Open mic on ibm notes traveler best practices
 
Connect2013 show100 making traveler highly available_part1_traveler design
Connect2013 show100 making traveler highly available_part1_traveler designConnect2013 show100 making traveler highly available_part1_traveler design
Connect2013 show100 making traveler highly available_part1_traveler design
 
Connect2014 id600 ibm notes traveler 2013 & beyond
Connect2014 id600 ibm notes traveler 2013 & beyondConnect2014 id600 ibm notes traveler 2013 & beyond
Connect2014 id600 ibm notes traveler 2013 & beyond
 
Connect 2013 show101 making ibm traveler high available_part2_extending and s...
Connect 2013 show101 making ibm traveler high available_part2_extending and s...Connect 2013 show101 making ibm traveler high available_part2_extending and s...
Connect 2013 show101 making ibm traveler high available_part2_extending and s...
 
Connect ed2015 mas101_user blast 2015
Connect ed2015 mas101_user blast 2015Connect ed2015 mas101_user blast 2015
Connect ed2015 mas101_user blast 2015
 
Connect ed2015 it must be notes, must be something else
Connect ed2015 it must be notes, must be something elseConnect ed2015 it must be notes, must be something else
Connect ed2015 it must be notes, must be something else
 
Connect ed2014 ad501_ibm worklight for ibm domino developers
Connect ed2014 ad501_ibm worklight for ibm domino developersConnect ed2014 ad501_ibm worklight for ibm domino developers
Connect ed2014 ad501_ibm worklight for ibm domino developers
 
Connect ed2015 bp104_ibm notes traveler daily business-administration monitor...
Connect ed2015 bp104_ibm notes traveler daily business-administration monitor...Connect ed2015 bp104_ibm notes traveler daily business-administration monitor...
Connect ed2015 bp104_ibm notes traveler daily business-administration monitor...
 
Matnewman ibm notes tip of the day traveler 9.0.1.1
Matnewman ibm notes tip of the day traveler 9.0.1.1Matnewman ibm notes tip of the day traveler 9.0.1.1
Matnewman ibm notes tip of the day traveler 9.0.1.1
 
Sametime meetings task reference
Sametime meetings task referenceSametime meetings task reference
Sametime meetings task reference
 
Sametime communicate task reference
Sametime communicate task referenceSametime communicate task reference
Sametime communicate task reference
 
Open mic on sametime 9 installs best practices, tips and tricks
Open mic on sametime 9 installs best practices, tips and tricksOpen mic on sametime 9 installs best practices, tips and tricks
Open mic on sametime 9 installs best practices, tips and tricks
 
Lcty2010 paris so11_sametime 8.5
Lcty2010 paris so11_sametime 8.5Lcty2010 paris so11_sametime 8.5
Lcty2010 paris so11_sametime 8.5
 
Instant chime plugin_installation_guide_for_ibm_sametime_9
Instant chime plugin_installation_guide_for_ibm_sametime_9Instant chime plugin_installation_guide_for_ibm_sametime_9
Instant chime plugin_installation_guide_for_ibm_sametime_9
 
Ibm sametime deployment planning open mic webcast
Ibm sametime deployment planning open mic webcastIbm sametime deployment planning open mic webcast
Ibm sametime deployment planning open mic webcast
 
Ibm sametime 9 for social communications
Ibm sametime 9 for social communicationsIbm sametime 9 for social communications
Ibm sametime 9 for social communications
 
Ibm sametime 9 complete basic features installation from zero to hero
Ibm sametime 9 complete basic features installation from zero to heroIbm sametime 9 complete basic features installation from zero to hero
Ibm sametime 9 complete basic features installation from zero to hero
 
Deploying ibm sametime 9 on aix 7.1
Deploying ibm sametime 9 on aix 7.1Deploying ibm sametime 9 on aix 7.1
Deploying ibm sametime 9 on aix 7.1
 
Architecting an ibm sametime 9.0 audio visual deployment
Architecting an ibm sametime 9.0 audio visual deploymentArchitecting an ibm sametime 9.0 audio visual deployment
Architecting an ibm sametime 9.0 audio visual deployment
 
Call and video calls task reference
Call and video calls task referenceCall and video calls task reference
Call and video calls task reference
 

Kürzlich hochgeladen

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Lte technology-for-engineers

  • 1. K025 LTE Technology for Engineers Page 9 Introduction to LTE 1 Introduction to LTE 1.1Where are we? C H A P T E R 1
  • 2. Page 10 K025 LTE Technology for Engineers Introduction to LTE
  • 3. K025 LTE Technology for Engineers Page 11 Introduction to LTE 1.2Release 99 UMTS/W-CDMA was initially conceived as a circuit switched based system and was not well-suited to IP packet based data traffic. Once the basic UMTS system was released and deployed, the need for better packet data capability became clear, especially with the rapidly increasing trend towards Internet style packet data services which are particularly bursty in nature. It supports Cell-DCH and typical speeds 384kb/s. Release 5: This release included the core of HSDPA itself. It provided for downlink packet support, reduced delays, a raw data rate (i.e. including payload, protocols, error correction, etc.) of 14 Mbps and gave an overall increase of around three times over the 3GPP UMTS Release 99 standard. Release 6: This included the core of HSUPA with an enhanced uplink with improved packet data support. This provided reduced delays, an uplink raw data rate of 5.74 Mbps and it gave an increased capacity of around twice that offered by the original Release 99 UMTS standard. Also included within this release was the Multimedia Broadcast Multicast Services (MBMS), providing improved broadcast services such as Mobile TV. Release 7: This release of the 3GPP standard included downlink MIMO operation as well as support for higher order modulation up to 64 QAM in the uplink and 16 QAM in the downlink. However, it only allows for either MIMO or higher order modulation. It also introduced protocol enhancements to allow support for Continuous Packet Connectivity (CPC).
  • 4. Page 12 K025 LTE Technology for Engineers Introduction to LTE Release 8: This release of the standard defines dual carrier operation as well as allowing simultaneous operation of the high order modulation schemes and MIMO. Further to this, latency is improved to keep it in line with the requirements for many new applications being used.
  • 5. K025 LTE Technology for Engineers Page 13 Introduction to LTE Rb_phy includes DPDCH (User data + L3 control) + Error protection + DPCCH (L1 control) DPCCH = Dedicated Physical Control Channel In UL, symbol rate=ch bit rate. The DPDCH channel bit rate is less than channel bit rate because the latter contains both DPDCH and DPCCH ch bit rates. The exact DPDCH bit rate depends on the slot format. DPDCH is shared by logical/transport channels (DCCH/DCH + DTCH/DCH). The exact DTCH bit rate depends on the selected channel configuration or transport format, for example with AMR 12.2, the DTCH is 12.2 kbit/s and DCCH is 3.7 kbit/s by default (SF = 128). For the channel coding, three options are supported: convolutional coding, turbo coding, or no channel coding. Channel coding selection is indicated by upper layers. For example, with single DPDCH in UL: – 960kbps can be obtained with SF=4, no coding – 400-500 kbps with coding With 3 codes, up to 5740 kbps uncoded or 2Mbps (or even more) with coding. Error Correction Coding Parameters Transport channel type Coding scheme Coding rate BCH, PCH, RACH Convolutional code 1/2 CPCH, DCH, DSCH, FACH Convolutional code 1/3, 1/2 CPCH, DCH, DSCH, FACH Turbo code 1/3 CPCH, DCH, DSCH, FACH No coding -
  • 6. Page 14 K025 LTE Technology for Engineers Introduction to LTE
  • 7. K025 LTE Technology for Engineers Page 15 Introduction to LTE 1.3UTRAN In UMTS, the UTRAN is formed from RNCs, Node Bs and their defined interfaces. An RNC is the UMTS equivalent of a GSM BSC, but has greater functionality. One of the main differences between UMTS (Release 99) and GSM (Release 99) is that there is an Iur interface interconnecting multiple RNCs. This additional interface permits the RNCs to communicate with each other, allowing soft handover (not present in GSM). Another difference between GSM and UMTS is that some of the Mobility Management (MM) has been moved to the RNC from the Core Network, allowing UTRAN initiated paging. The RNC has greater control over a group of cells and the functionality allows soft handover.
  • 8. Page 16 K025 LTE Technology for Engineers Introduction to LTE Core Network The Core Network is divided in circuit switched and packet switched domains. Some of the circuit switched elements are Mobile services Switching Centre (MSC), Visitor location register (VLR) and Gateway MSC. Packet switched elements are Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN). Some network elements, like EIR, HLR, VLR and AUC are shared by both domains. The functions of RNC are:  Radio Resource Control  Admission Control  Channel Allocation  Load Control  Handover Control  Macro Diversity  Ciphering  Segmentation / Reassembly  Broadcast Signalling  Open Loop Power Control
  • 9. K025 LTE Technology for Engineers Page 17 Introduction to LTE
  • 10. Page 18 K025 LTE Technology for Engineers Introduction to LTE
  • 11. K025 LTE Technology for Engineers Page 19 Introduction to LTE
  • 12. Page 20 K025 LTE Technology for Engineers Introduction to LTE Co-existence with legacy standards and systems: LTE users should be able to make voice calls from their terminal and have access to basic data services even when they are in areas without LTE coverage. LTE therefore allows smooth, seamless service handover in areas of HSPA, WCDMA or GSM/GPRS/EDGE coverage. Furthermore, LTE/SAE supports not only intra-system and intersystem handovers, but inter- domain handovers between packet switched and circuit switched sessions.
  • 13. K025 LTE Technology for Engineers Page 21 Introduction to LTE 1.43G Services and QoS Classes In UMTS, four Quality of Service classes have been defined: Conversational class is the QoS class for delay-sensitive real time services such as speech telephony. Streaming class is also regarded as a real-time QoS class. It is also sensitive to delays; it carries traffic, which looks real time to a human user. An application for streaming class QoS is audio streaming, where music files are downloaded to the receiver. There may be an interruption in the transmission, which is not relevant for the user of the application, as long as there is still enough data left in the buffer of the receiving equipment for seamless application provision. Interactive class is a non-real time QoS class. It is used for applications with limited delay-sensitivity (so-called interactive applications). But many applications on the internet still have timing constraints, such as http, ftp, telnet, and smtp. A response to a request is expected within a specific period of time. This is the QoS offered by the interactive class. Background class is a non-real time QoS class for background applications, which are not delay sensitive. Example applications are email and file downloading.
  • 14. Page 22 K025 LTE Technology for Engineers Introduction to LTE 1.5HS-PDSCH
  • 15. K025 LTE Technology for Engineers Page 23 Introduction to LTE 1.6HSDPA
  • 16. Page 24 K025 LTE Technology for Engineers Introduction to LTE 1.7HSUPA
  • 17. K025 LTE Technology for Engineers Page 25 Introduction to LTE [CL] From one phase to another, the main limitation is the product development - which resources you can offer to the user. TTI - 2 ms (HS-DSCH), 10 ms, 20 ms, 40 ms, and 80 ms TTI is length of transmission on the radio link
  • 18. Page 26 K025 LTE Technology for Engineers Introduction to LTE
  • 19. K025 LTE Technology for Engineers Page 27 Introduction to LTE
  • 20. Page 28 K025 LTE Technology for Engineers Introduction to LTE 1.8Upgrade Paths to LTE Who Needs LTE? Less than a decade on from the launch of the first 3G/UMTS networks, why is the cellular industry considering additional investments in its radio access and core network infrastructures? The answer lies in a changing market landscape, where user expectations are constantly increasing. In the fixed world, broadband connectivity is now ubiquitous with multi-megabit speeds available at reasonable cost to customers and business users via DSL and cable connections.
  • 21. K025 LTE Technology for Engineers Page 29 Introduction to LTE 1.9R8 LTE The result of these radio interface features is significantly improved radio performance, yielding up to five times the average throughput of HSPA. Downlink peak data rates are extended up to a theoretical maximum of 300 Mbit/s per 20 MHz of spectrum. Similarly, LTE theoretical uplink rates can reach 75 Mbit/s per 20 MHz of spectrum, with theoretical support for at least 200 active users per cell in 5 MHz. Reduced latency: By reducing round-trip times to 10ms or even less (compared with 40–50ms for HSPA), LTE delivers a more responsive user experience. This permits interactive, real-time services such as high-quality audio/videoconferencing and multi-player gaming.
  • 22. Page 30 K025 LTE Technology for Engineers Introduction to LTE
  • 23. K025 LTE Technology for Engineers Page 31 Introduction to LTE
  • 24. Page 32 K025 LTE Technology for Engineers Introduction to LTE
  • 25. K025 LTE Technology for Engineers Page 33 Introduction to LTE 1.10 Scalability of Bandwidth
  • 26. Page 34 K025 LTE Technology for Engineers Introduction to LTE 1.11 LTE Key Features Urban areas:  Most likely LTE will be deployed.  Stepwise deployment in UMTS 2.1 bands will be possible at a later stage. Rural areas: Option 1: deploy UMTS in 900 MHz band. Advantage: rollout can start now Disadvantage: a block of 5 MHz need to be taken out of the GSM band. Not a lot of operators can affort to take out this much spectrum due to heavy usage in this band Option 2: Introduce LTE in 900 MHz band Advantages: reuse of GSM 900 Sites; step by step introduction of LTE with smaller granularity (1.4 / 3 / 5 /…MHz).
  • 27. K025 LTE Technology for Engineers Page 35 Introduction to LTE
  • 28. Page 36 K025 LTE Technology for Engineers Introduction to LTE
  • 29. K025 LTE Technology for Engineers Page 37 Introduction to LTE
  • 30. Page 38 K025 LTE Technology for Engineers Introduction to LTE
  • 31. K025 LTE Technology for Engineers Page 39 Introduction to LTE
  • 32. Page 40 K025 LTE Technology for Engineers Introduction to LTE
  • 33. K025 LTE Technology for Engineers Page 41 IP Core Network Overview 2 IP Core Network Overview 2.1The TCP/IP Layers TCP/IP can be represented by the US DoD Model. This model describes the relationship between the main protocols used by TCP/IP. C H A P T E R 2
  • 34. Page 42 K025 LTE Technology for Engineers IP Core Network Overview Prior to the development of this model most network protocols were vendor dependent. The architecture behind TCP/IP is different in the sense that the same protocol model can be run on a multitude of different computer systems without modification of the operating system or hardware architecture. TCP/IP is designed to run as an application. The protocol was primarily used to support application-orientated functions and process-to-process communications between hosts. Specific applications to provide basic network services for users were written to run with TCP/IP. The objective of the lower protocols was to provide support for the network layer application services.
  • 35. K025 LTE Technology for Engineers Page 43 IP Core Network Overview 2.2Transport Layer Protocols Transport layer protocols provide two basic functions to the application layer services - quality of service and application multiplexing through port numbers. TCP/IP has two main transport layer protocols – TCP and UDP. UDP provides a simple datagram delivery service adding application multiplexing and a checksum to the underlying IP layer. It therefore provides the same unreliable, connectionless delivery service as IP. It does not use acknowledgements to confirm that messages have arrived, it does not provide any flow control mechanisms, and it does no sequencing - UDP messages can be duplicated, arrive out of order or not at all. UDP works well on LANs where error rates are low and delays small, but on WANs it behaves poorly, especially for large data transfers. TCP provides a reliable, connection-oriented, stream based delivery system by adding acknowledgements, sequencing and flow control to IP. This makes TCP much more efficient on WANs and for large data transfers, but it has a large protocol overhead which makes it slower and less efficient than UDP in certain applications. Most applications tend to use TCP because it provides reliable delivery, but time- sensitive, transactional and broadcast based applications need to use UDP.
  • 36. Page 44 K025 LTE Technology for Engineers IP Core Network Overview
  • 37. K025 LTE Technology for Engineers Page 45 IP Core Network Overview
  • 38. Page 46 K025 LTE Technology for Engineers IP Core Network Overview
  • 39. K025 LTE Technology for Engineers Page 47 IP Core Network Overview 2.3Application Layer Services The power behind TCP/IP is not the sophisticated and powerful nature of the protocol architecture, but rather it is the absolute simplicity of the protocol. This is equally true of the application-level services which are designed to provide network services for users. TCP/IP provides a consistent application front end to users regardless of the operating system, platform, or network architecture which is used. Many of the application level services retain the look and feel of simple character-oriented applications. Even today, with TCP/IP providing GUI, once the superficial GUI is removed, the same basic element of code is used to provide the network service. The Transport layer protocols (TCP/UDP) use Port Numbers to uniquely identify each application level service. The client usually generates a port number above 1,023 to identify the process and the server always uses a well known port number.
  • 40. Page 48 K025 LTE Technology for Engineers IP Core Network Overview
  • 41. K025 LTE Technology for Engineers Page 49 IP Core Network Overview
  • 42. Page 50 K025 LTE Technology for Engineers IP Core Network Overview
  • 43. K025 LTE Technology for Engineers Page 51 IP Core Network Overview
  • 44. Page 52 K025 LTE Technology for Engineers IP Core Network Overview 2.4TCP/IP Inter-networks The term internetworking is used to describe a number of discrete physical networks that are connected together to form an internet. A characteristic of such an internet is that the underlying physical network structure should be invisible to network users. Internetworking is defined as a combination of interconnection and interoperation (the ability to physically exchange data and make some sense from it).
  • 45. K025 LTE Technology for Engineers Page 53 IP Core Network Overview 2.5IP Datagram Format VERS Protocol version (currently 4) HLEN Length of header in 32 bit words (normally 5) Service Type Sets a precedence and Type of Service for the packet (normally 0) Total Length Length of IP datagram in octets including header & data - Maximum of 65535 Identification Unique ID for each datagram, used for fragmentation Flags Controls fragmentation (DF - don't fragment and MF - more fragments) Fragment Offset Position of data in this fragment compared to original datagram - units of 8 octets Time To Live Specifies how long (in router hops) the datagram is to remain in the internet. Protocol ID of transport protocol - UDP, TCP, (ICMP) etc. Checksum Checksum of the header only Source IP Address 32 bit IP address of source Destination IP Address 32 bit IP address of destination IP Options Option type and data for additional facilities - network management and debugging
  • 46. Page 54 K025 LTE Technology for Engineers IP Core Network Overview Padding Padding to extend options data to multiple of 4 octets DATA The higher level Protocol Data Unit (PDU)
  • 47. K025 LTE Technology for Engineers Page 55 IP Core Network Overview 2.6Maximum Transfer Unit (MTU) Each physical network has a defined limit on the size of protocol which it can support. This is known as the Maximum Transfer Unit (MTU) and is generally considered a hard limit of the network which cannot be increased. The MTU is the maximum size of software protocol which can be sent, and not the maximum size of frame which can be supported. If hardware control information (such as physical addresses) is added to the MTU, the maximum frame size can be derived. Ethernet limits transfers to 1500 bytes of data, which FDDI permits approximately 4470 bytes of data per frame. MTUs vary considerably in size. Local area networks, which generally use high bandwidth, low bit error rate media have relatively large MTUs, while wide area networks have much smaller MTUs. Limiting datagram size to fit the smallest possible MTU in the internet makes transfers inefficient when those datagrams pass across a network which can carry larger size frames. However, allowing datagrams to be larger than the minimum network MTU in an internet means that a datagram may not always fit into a single network frame. Instead of making IP datagrams adhere to the constraints of physical networks, TCP/IP software chooses a convenient initial datagram size and arranges a way to divide large datagrams into smaller pieces when the datagram needs to traverse a network that has a small MTU. The small pieces into which a datagram is divided are called fragments, and the process of dividing a datagram is known as fragmentation.
  • 48. Page 56 K025 LTE Technology for Engineers IP Core Network Overview 2.7Fragmentation Hosts can choose to send datagrams up to the supported MTU of their own network. Routers interconnect different physical networks with varying MTUs. Routers can fragment datagrams if desired to permit transport across networks which have smaller MTUs. The IP protocol does not limit datagram size nor does it guarantee that the datagram will be delivered without fragmentation. The source can choose any datagram size it thinks appropriate; fragmentation and reassembly occur automatically, without taking action. The IP specification states that routers must accept datagrams up to the maximum of the MTUs of the networks to which they are attached. Once a datagram has been fragmented, the fragments travel all the way to the final destination, where they reassembled. This has a number of disadvantages - small fragments must be carried by networks which could support larger MTUs, and reassembling the datagrams at the destination can lead to inefficiency, particularly if fragments are lost. If fragments are lost, the original datagram cannot be reassembled. The receiving machine starts a reassembly timer when it receives an initial fragment. If the timer expires before all fragments arrive, the receiving machine discards the surviving pieces without processing the datagram. Performing reassembly at the ultimate destination works well, and permits each fragment to be routed independently as well as sparing resources on routers.
  • 49. K025 LTE Technology for Engineers Page 57 IP Core Network Overview 2.8Time To Live (TTL) The TIME To LIVE specifies how long, in seconds, the datagram is permitted to remain in the internet. Whenever a host injects a datagram into the internet, it sets a maximum time that the datagram should survive. Router and hosts that process datagrams must decrement the TIME To LIVE field as time passes and remove the datagram from the internet when the value in this field reaches zero. Estimating exact time is difficult because routers do not usually know the transit time of physical networks. A few rules simplify processing and make it easy to handle datagrams without synchronise clocks. First, each router along the path from source to destination is required to decrement the TIME To LIVE field when the datagram header is processed. Furthermore, to handle cases of overloaded routers that introduce long delays, each router records the local time when the datagram arrives and decrements the TIME To LIVE by the number of seconds that the datagram remained inside the router waiting for service.
  • 50. Page 58 K025 LTE Technology for Engineers IP Core Network Overview
  • 51. K025 LTE Technology for Engineers Page 59 IP Core Network Overview 2.9IP Addresses TCP/IP uses a 32-bit binary address to uniquely identify a device on a TCP/IP internetwork. The binary address string is a network layer logical address which must be configured by the network manager. The address is used to identify the device in a virtual network. The 32-bit address structure is divided into a single-level hierarchy where the leading bits in the address are used to describe a network in logical terms and the remaining bits are used to describe the host on the logical network. The number of bits which are used in each case varies, and will be covered later. The leading bits which make up the logical network address are used to provide a routing (packet forwarding) mechanism between logical networks. This allows for far more efficient routing than a flat address space.
  • 52. Page 60 K025 LTE Technology for Engineers IP Core Network Overview 2.10 Dotted Decimal Notation Binary address strings are very difficult to work with. To overcome this problem and make logical addressing easier to comprehend, the 32-bit address string is divided into 8-bit bytes and then converted into the corresponding decimal notation. It is this dotted decimal notation which is used to configure hosts on a TCP/IP network. However, it should be noted that decimal addresses are a human and humane interface to TCP/IP. As far as the host is concerned, the address appears and is used as a binary string. This is the cause of much confusion.
  • 53. K025 LTE Technology for Engineers Page 61 IP Core Network Overview 2.11 Address Classes There are five main classes of IP addresses but only three are directly usable: A, B and C. For a Class A address, 8-bits are used to logically identify the network. For Class B, 16-bits are used, and for Class C, 24-bits are used. In each case, once the network bits have been allocated, the remaining bits are used to logically identify the node. Class E addresses are reserved for testing and development by the IETF and cannot be assigned to any device. Class D addresses are software multicast addresses and reserved for the use of routing protocols such as OSPF, RIPv2 and so on. The address categorisation is derived from the high bit order rule of the first byte. The high bit order rule is interrupted by every TCP/IP stack as soon as an address is entered. This rule is also used to define the decimal ranges in the first byte of each address.
  • 54. Page 62 K025 LTE Technology for Engineers IP Core Network Overview 2.12 Special IP Addresses Some binary bit patterns are reserved for management reasons and cannot be allocated to devices on a TCP/IP network. Although the Internet Protocol has been stable for a considerable number of years, the way IP addresses are used and interpreted has changed over the years. In general, 1’s indicate "All" and 0’s indicate "Any" - the local broadcast address is an obvious exception; a broadcast to all hosts on all networks (on the Internet) would cause chaos!
  • 55. K025 LTE Technology for Engineers Page 63 IP Core Network Overview 2.13 Realtime Transport Protocol (RTP)
  • 56. Page 64 K025 LTE Technology for Engineers IP Core Network Overview
  • 57. K025 LTE Technology for Engineers Page 65 IP Core Network Overview
  • 58. Page 66 K025 LTE Technology for Engineers IP Core Network Overview 2.14 Base Header Format Although the IPv6 header must accommodate larger addresses, an IPv6 base header contains less information than an IPv4 header. Options and some of the fixed fields that appear in an IPv4 header have been moved to extension headers. Changes in the datagram header reflect changes in the protocol:  Alignment has been changed from 32-bit multiple to 64-bit multiples.  The header length field has been eliminated, and the datagram length field has been replaced by a Payload  Length field.  The size of the source and destination address fields has been increased to 16 bytes each.  Fragmentation information has been moved out of fixed fields in the base header into an extension header.  The Time-to-Live field has been replaced by a Hop Limit field.  The Service Type field has been replaced by a Flow Label field.  The Protocol field has been replaced by a field that specifies the type of the next header.
  • 59. K025 LTE Technology for Engineers Page 67 IP Core Network Overview IPv6 handles packet length specification in a new way. Firstly, because the size of the base header is fixed at 40 bytes, the header does not include a field for the header length. Secondly, IPv6 replaces IPv4 packet length field with a 16-bit Payload Length field that specifies the number of octets carried in the packet excluding the header. An IPv6 packet can contain 64k bytes of data.
  • 60. Page 68 K025 LTE Technology for Engineers IP Core Network Overview
  • 61. K025 LTE Technology for Engineers Page 69 IP Core Network Overview
  • 62. Page 70 K025 LTE Technology for Engineers IP Core Network Overview The fixed header occupies the first 40 octets (320 bits) of the IPv6 packet. It contains the source and destination addresses, traffic classification options, a hop counter, and a pointer for extension headers if any. The Next Header field, present in each extension as well, points to the next element in the chain of extensions
  • 63. K025 LTE Technology for Engineers Page 71 IP Core Network Overview
  • 64. Page 72 K025 LTE Technology for Engineers IP Core Network Overview 2.15 The Need for QoS
  • 65. K025 LTE Technology for Engineers Page 73 IP Core Network Overview 2.16 IP Precedence IP Precedence was designed in IPv4 by the IETF. It uses 3 bits of the 8-bit Type of Service (TOS) field of an IP header. There are 8 classes of services in IP Precedence. The classification range is 0-7 where 0 (zero) is the lowest and 7 is the highest priority. The original intention of the TOS field was for a sending host to specify a preference for how the datagram would be handled as it made its way through an internet. For instance, one host could set its IPv4 datagrams' TOS field value to prefer low delay, while another might prefer high reliability.
  • 66. Page 74 K025 LTE Technology for Engineers IP Core Network Overview IP Precedence provides the ability to classify network packets at Layer 3. With IP Precedence configured, network packets traverse IP Precedence devices according to the priority you set. Priority traffic is always serviced before traditional traffic.
  • 67. K025 LTE Technology for Engineers Page 75 IP Core Network Overview 2.17 Type of Service The Type of Service field in the IP header was originally defined in RFC 791. It defined a mechanism for assigning a priority to each IP packet as well as a mechanism to request specific treatment such as high throughput, high reliability or low latency. Differentiated Services Code Point In RFC 2474 the definition of this entire field was changed. It is now called the "DS" (Differentiated Services) field and the upper 6 bits contain a value called the "DSCP" (Differentiated Services Code Point). Since RFC 3168, the remaining two bits (the two least significant bits) are used for Explicit Congestion Notification.
  • 68. Page 76 K025 LTE Technology for Engineers IP Core Network Overview In theory, a network could have up to 64 (i.e. 26) different traffic classes using different markings in the DSCP. The DiffServ RFCs recommend, but do not require, certain encodings. This gives a network operator great flexibility in defining traffic classes. In practice, however, most networks use the following commonly-defined Per-Hop Behaviors:  Default PHB—which is typically best-effort traffic  Expedited Forwarding (EF) PHB—dedicated to low-loss, low-latency traffic  Assured Forwarding (AF) PHB— which gives assurance of delivery under conditions  Class Selector PHBs—which are defined to maintain backward compatibility with the IP Precedence field
  • 69. K025 LTE Technology for Engineers Page 77 IP Core Network Overview The DS field consists of a 6-bit differentiated services code point (DSCP) RFC 2474. Explicit Congestion Notification occupies the least-significant 2 bits. ECN allows end- to-end notification of network congestion without dropping packets
  • 70. Page 78 K025 LTE Technology for Engineers IP Core Network Overview
  • 71. K025 LTE Technology for Engineers Page 79 IP Core Network Overview Because the CE indication can only be handled effectively by an upper layer protocol that supports it, ECN is only used in conjunction with upper layer protocols (for example, TCP).
  • 72. Page 80 K025 LTE Technology for Engineers IP Core Network Overview
  • 73. K025 LTE Technology for Engineers Page 81 IP Core Network Overview 2.18 Differentiated Services
  • 74. Page 82 K025 LTE Technology for Engineers IP Core Network Overview If you need to mark packets in your network and all of the devices support IP DSCP marking and matching, use the IP DSCP marking to mark your packets. This is because the IP DSCP markings provide more packet marking options. 64 individual values can be marked using IP DSCP marking, while only 8 individual values can be marked using IP precedence marking.
  • 75. K025 LTE Technology for Engineers Page 83 IP Core Network Overview
  • 76. Page 84 K025 LTE Technology for Engineers IP Core Network Overview Expedited Forwarding (EF) PHB—dedicated to low-loss, low-latency traffic. These characteristics are suitable for voice, video and other realtime services. EF traffic is often given strict priority queuing above all other traffic classes. Because an overload of EF traffic will cause queuing delays and affect the jitter and delay tolerances within the class, EF traffic is often strictly controlled through admission control, policing and other mechanisms.
  • 77. K025 LTE Technology for Engineers Page 85 IP Core Network Overview
  • 78. Page 86 K025 LTE Technology for Engineers IP Core Network Overview 2.19 Assured Forwarding There are four assured forwarding (AF) classes, AF1x through AF4x. The first number corresponds to the AF class and the second number (x) refers to the level of drop preference within each AF class. There are three drop probabilities, ranging from 1 (low drop) through 3 (high drop). Depending on a network policy, packets can be selected for a PHB based on required throughput, delay, jitter, loss, or according to the priority of access to network services
  • 79. K025 LTE Technology for Engineers Page 87 IP Core Network Overview
  • 80. Page 88 K025 LTE Technology for Engineers IP Core Network Overview 2.20 Weighted Fair Queing
  • 81. K025 LTE Technology for Engineers Page 89 IP Core Network Overview 2.20.1 RNC Scheduling
  • 82. Page 90 K025 LTE Technology for Engineers IP Core Network Overview 2.21 Questions
  • 83. K025 LTE Technology for Engineers Page 91 Layer 2 Switching 3 Layer 2 Switching 3.1Introduction C H A P T E R 3
  • 84. Page 92 K025 LTE Technology for Engineers Layer 2 Switching With the introduction of 4G systems, wireless networks are evolving to next- generation packet architectures capable of supporting enhanced broadband connections. Simple text messaging and slow email downloads are being replaced by high-speed connections that support true mobile office applications, real time video, streaming music, and other rich multimedia applications. 4G wireless networks will approach the broadband speeds and user experience now provided by traditional DSL and cable modem wireline service. From the wireless operator’s perspective, 4G systems are vastly more efficient at using valuable wireless spectrum. These spectral efficiency improvements support new high-speed services, as well as larger numbers of users. The additional speeds and capacity provided by 4G wireless networks put additional strains on mobile backhaul networks and the carriers providing these backhaul services. Not only are the transport requirements much higher, but there is also a fundamental shift from TDM transport in 2G and 3G networks to packet transport in 4G networks. Understanding the impact of 4G on mobile backhaul transport is critical to deploying efficient, cost-effective transport solutions that meet wireless carrier expectations for performance, reliability and cost.
  • 85. K025 LTE Technology for Engineers Page 93 Layer 2 Switching 3.2Spectral Efficiency The amount of bandwidth on a wireless network is ultimately constrained by two factors: the spectral efficiency of the wireless interface and the amount of licensed spectrum a carrier owns. Spectral efficiency is a fancy way of saying how much information can be transmitted over a given radio channel (i.e., Hz). Spectral efficiency is measured as the amount of data (bps) that can be transmitted for every Hz of spectrum; the higher the number (bps/Hz), the better. Newer technologies, such as LTE, use advanced modulation schemes (OFDM) that support higher spectral efficiencies and higher data rates than 2G and 3G wireless networks.
  • 86. Page 94 K025 LTE Technology for Engineers Layer 2 Switching
  • 87. K025 LTE Technology for Engineers Page 95 Layer 2 Switching 3.3TCP/IP Layers TCP/IP can be represented by the US DoD Model. This model describes the relationship between the main protocols used by TCP/IP. Prior to the development of this model most network protocols were vendor- dependent. The architecture behind TCP/IP is different in the sense that the same protocol model can be run on a multitude of different computer systems without modification of the operating system or hardware architecture. TCP/IP is designed to run as an application. The protocol was primarily used to support application-orientated functions and process-to-process communications between hosts. Specific applications to provide basic network services for users were written to run with TCP/IP. The objective of the lower protocols was to provide support for the network layer application services.
  • 88. Page 96 K025 LTE Technology for Engineers Layer 2 Switching
  • 89. K025 LTE Technology for Engineers Page 97 Layer 2 Switching 3.4Message Switching Message switching moves the entire message from connecting point to connecting point, one step at a time. This method is sometimes referred to as ‘store & forward’. Message switching creates a virtual or dedicated connection to the next switching station. The entire message is transmitted and then the connection is terminated. The receiving station must buffer the entire message and then create a connection to the next switching station and forward the entire message. The message is forwarded one step at time until it is received at the final destination. The best example of message switching is E-mail servers.
  • 90. Page 98 K025 LTE Technology for Engineers Layer 2 Switching 3.5Frames A frame is the fundamental unit of data transfer used on LANs. It has specific network characteristics which relate to the type of network it originated on. All IEEE compliant frames have a similar structure and start with a preamble which is followed by hardware addresses for source and destination stations. Some network frames (Token Ring) have some special fields for specific MAC control. After the source MAC address, the LLC protocol data unit follows. Generally, LLC is three bytes in size followed by the network layer protocol. The maximum and minimum size of the protocol which follows LLC is dependent on the type of network. The frame is finished by a four-byte trailer used for error checking.
  • 91. K025 LTE Technology for Engineers Page 99 Layer 2 Switching
  • 92. Page 100 K025 LTE Technology for Engineers Layer 2 Switching
  • 93. K025 LTE Technology for Engineers Page 101 Layer 2 Switching 3.6Hardware Addresses A universal address is assigned to a Network Interface Card (NIC) on manufacture. The address is stored in an EPROM and, as the device is initialised, the address is copied into RAM where it can be used by software. The address is 48 bits in size, divided into six eight-bit fields. The first byte of the address (left hand side) is byte 0 and the last byte (right hand side) is byte 5. The first three bytes of the address (0, 1 and 2) indicate the vendor, and are unique to that vendor. The last three bytes of the address (3, 4 and 5) can be assigned by the vendor (approx. 16M addresses per Vendor Code). For IEEE addressing, two other bits are important in the address. The least significant bit of the first byte (byte 0) indicates an Individual/Group address. A value of 0 indicates a unicast address and 1 indicates a multicast. The second bit of this byte indicates a universally assigned address or locally managed (where the address has been changed by software). Locally managed addresses are supported by different LAN technologies, but caution must be used when setting locally managed addresses. It is the Network Manager’s responsibility to ensure that the assigned addresses are unique. Hardware addresses are Data Link characteristics of the OSI protocol stack. They are separate from software protocol addresses, which are Network layer addresses.
  • 94. Page 102 K025 LTE Technology for Engineers Layer 2 Switching 3.7Store & Forward A store and forward switching hub stores the full incoming frame in a buffer. This enables the switch to perform a CRC check to see if the frame contains any errors. If the frame is error-free, the switch uses an address lookup table to obtain a destination port. Once the address is obtained, the switch performs a cross-connect operation and forwards the frame to the destination. Since the frame must be buffered in shared RAM, this results in greater latency than that provided by cut through switching. A key advantage of store and forward switches, results from the buffering of the frames in the switch. Since they are placed in memory, this enables frame processing functions to be added to the switch, permitting vendors to support a variety of filtering operations and the gathering of statistics for management reports.
  • 95. K025 LTE Technology for Engineers Page 103 Layer 2 Switching 3.7.1 Cut Through Switching A cut through switch examines the destination address of each frame entering the port. It then searches a table of addresses associated with ports to obtain a port destination. Once the port destination is determined, the switch initiates the cross- connection between incoming and outgoing port. Cut through switching minimises the delay or latency associated with placing a frame received on one port onto another port. Since the switching decision is made once the destination address is read, this means that the full frame is not examined. Thus the switch cannot perform error checking on a frame. This limitation does not present a problem on most LANs, due to the extremely low error rates. However, when erroneous frames are encountered, they are passed from one network segment to another. This results in an unnecessary increase in network utilisation on the destination segment, as a store and forward switch would discard the frames containing one or more bit errors.
  • 96. Page 104 K025 LTE Technology for Engineers Layer 2 Switching 3.7.2 Modified Cut-Through Modified cut-through switches attempt to offer the best of both worlds by holding an incoming Ethernet frame until the first 64 bytes have been received. If the frame is bad, it is nearly always detected within the first 64 bytes, so a trade-off between switch latency and error-checking is achieved. In effect, modified cut-though switches act as store and forward switches for short frames. For large frames they act like cut- through switches.
  • 97. K025 LTE Technology for Engineers Page 105 Layer 2 Switching 3.8Switches and VLAN’s
  • 98. Page 106 K025 LTE Technology for Engineers Layer 2 Switching
  • 99. K025 LTE Technology for Engineers Page 107 Layer 2 Switching Within corporate networks system administrators like to segregate users into separate networks. The old method would have required that all users of one network be connected to the same physical devices. With modern switches, it is possible to isolate users into separate networks, whilst connected to the same layer 2 devices. Users belonging to the same network are simply attached to ports on a layer 2 switch. These ports are then programmed to be part of the same virtual network. A virtual network is known as a Virtual LAN (VLAN) and user ports on the same virtual network would share the same VLAN ID. You may have users who wish to be part of the same VLAN whilst connected to different layer 2 switches. A physical connection between the switches needs to be established, and the ports at either end of the link would have to be part of the same VLAN. VLAN Tagging (IEEE 802.1q) The diagram above also shows the additional fields within the layer 2 ethernet frame that can be used to identify traffic from separate VLANs. The fields are:  TPI Tag Protocol Identifier.  P Priority Bits.  C Canonical, format of MAC addresses.  VI = VLAN ID.
  • 100. Page 108 K025 LTE Technology for Engineers Layer 2 Switching
  • 101. K025 LTE Technology for Engineers Page 109 Layer 2 Switching 3.9Link Aggregation
  • 102. Page 110 K025 LTE Technology for Engineers Layer 2 Switching
  • 103. K025 LTE Technology for Engineers Page 111 Layer 2 Switching
  • 104. Page 112 K025 LTE Technology for Engineers Layer 2 Switching
  • 105. K025 LTE Technology for Engineers Page 113 Layer 2 Switching
  • 106. Page 114 K025 LTE Technology for Engineers Layer 2 Switching 3.10 Carrier Ethernet Overview The Metro Ethernet Forum (MEF) has led the industry in propagating Carrier Ethernet and has identified five key attributes that distinguish Carrier Ethernet from traditional LAN based Ethernet. These are:  Standardised services  Scalability  Service manageability  Quality of service  Reliability Making Ethernet Connection-Oriented Historically, Ethernet has been a connectionless technology by design. In classic LAN environments, the connectionless capabilities of Ethernet MAC bridging and CSMA/CD provided considerable flexibility, simplicity, and economy in networking latency-insensitive traffic within a single, well-bounded administrative domain.
  • 107. K025 LTE Technology for Engineers Page 115 Layer 2 Switching
  • 108. Page 116 K025 LTE Technology for Engineers Layer 2 Switching
  • 109. K025 LTE Technology for Engineers Page 117 Layer 2 Switching
  • 110. Page 118 K025 LTE Technology for Engineers Layer 2 Switching 3.11 The Three Essential Functions of Connection- Oriented Ethernet The three essential functions that make Ethernet connection-oriented are:  Predetermined EVC paths  Resource reservation and admission control  Per-connection traffic engineering and traffic management The ability to predetermine the EVC path through the Ethernet network is fundamental to making Ethernet connection-oriented. In classic connectionless Ethernet bridging, Ethernet frames are forwarded in the network according to the MAC bridging tables in the learning bridge. If a destination MAC address is unknown, the bridge floods the frame to all ports in the broadcast domain. Spanning tree protocols like IEEE 802.1s are run to ensure that there are no loops in the topology and to provide network restoration in the event of failure. Depending upon the location and sequence of network failures, the path EVCs take through the network may be difficult to predetermine. Predetermining the EVC path—either through a management plane application or via an embedded control plane—ensures that all frames in the EVC pass over the same sets of nodes. Therefore, intelligence regarding the connection as a whole can now be imparted to all nodes along the path.
  • 111. K025 LTE Technology for Engineers Page 119 Layer 2 Switching Resource reservation and CAC is the next critical function. Now that the EVC path through the network has been explicitly identified, the actual bandwidth and queuing resources required for each EVC are reserved in all nodes along the path. This is vital to ensure the highest possible levels of performance in terms of packet loss, latency, and jitter. CAC ensures that the requested resource is actually available in each node along the path prior to establishing the EVC. Once the path has been determined and the resources allocated, the traffic engineering and traffic management functions ensure that the requested connection performance is actually delivered. After packets have been classified on network ingress, a variety of traffic management functions must be provided in any packet- based network. These include:  Policing  Shaping  Queuing  Scheduling
  • 112. Page 120 K025 LTE Technology for Engineers Layer 2 Switching
  • 113. K025 LTE Technology for Engineers Page 121 Layer 2 Switching
  • 114. Page 122 K025 LTE Technology for Engineers Layer 2 Switching
  • 115. K025 LTE Technology for Engineers Page 123 Layer 2 Switching
  • 116. Page 124 K025 LTE Technology for Engineers Layer 2 Switching 3.12 Colour Marking Packet classification is the processes of identifying to which EVCs the incoming frames belong. The Ingress equipment can examine a variety of Ethernet and IP layer information to make this decision. Once the incoming frame is classified, policing is then applied to ensure that all frames coming into the network conform to the traffic contract, known as the bandwidth profile, agreed to upon connection setup. Two- level, three-colour marking allows incoming frames that conform to the CIR to be admitted to the network. Frames that exceed even the EIR are discarded immediately, and frames that exceed the CIR, but not the EIR, are marked for possible discard later, should the network become congested. An EVC can be subject to a single such policer if the bandwidth profile is applied to the entire EVC. EVCs can also include bandwidth profiles for each of many CoS classes within the EVC. In this case, a single EVC can be subject to multiple policers.
  • 117. K025 LTE Technology for Engineers Page 125 Layer 2 Switching 3.13 Traffic Policing and Shaping
  • 118. Page 126 K025 LTE Technology for Engineers Layer 2 Switching 3.14 MEF Bandwidth Profiles
  • 119. K025 LTE Technology for Engineers Page 127 Layer 2 Switching
  • 120. Page 128 K025 LTE Technology for Engineers Layer 2 Switching 3.15 Mapping at the UNIs
  • 121. K025 LTE Technology for Engineers Page 129 Layer 2 Switching
  • 122. Page 130 K025 LTE Technology for Engineers Layer 2 Switching 3.16 Class of Service (CoS)
  • 123. K025 LTE Technology for Engineers Page 131 Layer 2 Switching 3.17 IEEE 802.1Q — Virtual LANS (VLANS) 802.1Q provides for tagging Ethernet frames with VLAN IDs. It provides the mechanism that enables multiple-bridged networks to transparently share the same physical network while maintaining the isolation between networks. Ethernet switches deliver packets within the same VLAN and send the traffic between different VLANs to internal or external routers to perform the routing function. 802.1Q only supports up to 4094 VLANs, which is a scaling constraint for service providers.
  • 124. Page 132 K025 LTE Technology for Engineers Layer 2 Switching 3.18 Carrier Ethernet Services
  • 125. K025 LTE Technology for Engineers Page 133 Layer 2 Switching Based on the Metro Ethernet Forum’s (MEF) definitions, there are two broad categories of Carrier Ethernet services: point-to-point, referred to as E-Line services; and multipoint, referred to as E-LAN services. Both E-line and E-LAN services are often provided with multiple classes of service (CoS); where a single Ethernet virtual connection (EVC) can carry traffic with one or more CoS. Service providers desire to build networks that offer all services simultaneously on a single converged infrastructure.
  • 126. Page 134 K025 LTE Technology for Engineers Layer 2 Switching
  • 127. K025 LTE Technology for Engineers Page 135 Layer 2 Switching
  • 128. Page 136 K025 LTE Technology for Engineers Layer 2 Switching 3.19 Questions
  • 129. K025 LTE Technology for Engineers Page 137 LTE Basic Air Interface 4 LTE Basic Air Interface 4.1New Air Interface C H A P T E R 4
  • 130. Page 138 K025 LTE Technology for Engineers LTE Basic Air Interface 4.2OFDMA The downlink transmission scheme for E-UTRA FDD and TDD modes is based on conventional OFDM. In an OFDM system, the available spectrum is divided into multiple carriers, called subcarriers. Each of these subcarriers is independently modulated by a low rate data stream. OFDM is used as well in WLAN, WiMAX and broadcast technologies like DVB. OFDM has several benefits including its robustness against multipath fading and its efficient receiver architecture.
  • 131. K025 LTE Technology for Engineers Page 139 LTE Basic Air Interface 4.3Advanced Antenna Techniques LTE uses advanced antenna techniques and wider spectrum allocations to provide higher data rates throughout the cell area. LTE supports MIMO, SDMA and beamforming . These techniques are complementary and can be used to trade off between higher sector capacity, higher user data rates, or higher cell-edge rates, and thus enable operators to have finer control over the end-user experience. DL MIMO—LTE supports up to 4x4 MIMO in the DL, which uses four transmit antennas at the Node B to transmit orthogonal (parallel) data streams to the four receive antennas at the user equipment (UE). Using additional antennas and signal processing at the receiver and transmitter, MIMO increases the system capacity and user data rates without using additional transmit power or bandwidth. To be most effective, MIMO needs a high signal-to-noise ratio (SNR) at the UE and a rich scattering environment. High SNR ensures that the UE is able to decode the incoming signal, and a rich scattering environment ensures the orthogonality of the multiple data streams. The MIMO benefit is therefore maximised in a dense urban environment, where there is enough scattering and the small cell sizes provide an environment of high SNRs at the UE.
  • 132. Page 140 K025 LTE Technology for Engineers LTE Basic Air Interface
  • 133. K025 LTE Technology for Engineers Page 141 LTE Basic Air Interface SU-MIMO Similarly, on the UL, SDMA enables two users in the cell to simultaneously send data to the eNode B, using the same time-frequency resource. Even though the transmissions are simultaneous, the spatial separation ensures that the two data streams do not interfere with each other. Allowing these concurrent transmissions increases the cell capacity in both the DL and the UL. LTE does not support simultaneous MIMO and SDMA operation to a user; hence, there is a tradeoff between higher user data rates and higher system capacity in the DL.
  • 134. Page 142 K025 LTE Technology for Engineers LTE Basic Air Interface Beamforming Beamforming increases the user data rates by focusing the transmit power in the direction of the user, effectively increasing the received signal strength at the UE. Beamforming provides the most benefits to users in weaker-signal-strength areas, like the edge of the cell coverage. Beamforming ensures that cell-edge rates are high, and enables the operator to deploy high-bandwidth services without concern for service degradation at the cell edge.
  • 135. K025 LTE Technology for Engineers Page 143 LTE Basic Air Interface 4.4Cyclic Delay Diversity
  • 136. Page 144 K025 LTE Technology for Engineers LTE Basic Air Interface 4.5FDD/TDD LTE can be used in both paired (FDD) and unpaired (TDD) spectrum. Leading suppliers’ first product releases will support both duplex schemes. In general, FDD is more efficient and represents higher device and infrastructure volumes, while TDD is a good complement, for example in spectrum centre gaps. All cellular systems today use FDD, and more than 90 per cent of the world’s mobile frequencies available are in paired bands. With FDD, downlink and uplink traffic is transmitted simultaneously in separate frequency bands. With TDD the transmission in uplink and downlink is discontinuous within the same frequency band. As an example, if the time split between down- and uplink is 1/1, the uplink is used half of the time. The average power for each link is then also half of the peak power. As peak power is limited by regulatory requirements, the result is that for the same peak power, TDD will offer less coverage than FDD.
  • 137. K025 LTE Technology for Engineers Page 145 LTE Basic Air Interface 4.5.1 FDD Two frame structure types are defined for E-UTRA: frame structure type 1 for FDD mode, and frame structure type 2 for TDD mode. For the frame structure type 1, the 10 ms radio frame is divided into 20 equally sized slots of 0.5ms. A sub-frame consists of two consecutive slots, so one radio frame contains ten sub-frames.
  • 138. Page 146 K025 LTE Technology for Engineers LTE Basic Air Interface 4.5.2 TDD The frame structure for the type 2 frames used on LTE TDD is somewhat different. The 10 ms frame comprises two half frames, each 5 ms long. The LTE half-frames are further split into five sub-frames, each 1ms long. With TDD the transmission in uplink and downlink is discontinuous within the same frequency band. As an example, if the time split between down- and uplink is 1/1, the uplink is used half of the time. The average power for each link is then also half of the peak power. As peak power is limited by regulatory requirements, the result is that for the same peak power, TDD will offer less coverage than FDD.
  • 139. K025 LTE Technology for Engineers Page 147 LTE Basic Air Interface The special subframes consist of the three fields:  DwPTS (Downlink Pilot Timeslot)  GP (Guard Period)  UpPTS (Uplink Pilot Timeslot). The special frames replace what would be a normal sub-frame.
  • 140. Page 148 K025 LTE Technology for Engineers LTE Basic Air Interface The DL to UL switching method ensures that the high power downlink transmissions from the eNodeB from other neighbour cells do not interfere when the eNodeB UL reception is going in the current cell.
  • 141. K025 LTE Technology for Engineers Page 149 LTE Basic Air Interface 4.5.3 LTE TDD / TD-LTE Subframe Allocations One of the advantages of using LTE TDD is that it is possible to dynamically change the up and downlink balance and characteristics to meet the load conditions. In order that this can be achieved in an ordered fashion, a number of standard configurations have been set within the LTE standards. A total of seven up/downlink configurations have been set, and these use either 5 ms or 10 ms switch periodicities. In the case of the 5ms switch point periodicity, a special sub-frame exists in both half frames. In the case of the 10 ms periodicity, the special subframe exists in the first half frame only. It can be seen from the table above that the sub-frames 0 and 5 as well as DwPTS are always reserved for the downlink. It can also be seen that UpPTS and the sub-frame immediately following the special subframe are always reserved for the uplink transmission.
  • 142. Page 150 K025 LTE Technology for Engineers LTE Basic Air Interface 4.5.4 Flexible Carrier Bandwidths LTE is defined to support flexible carrier bandwidths from below 1.4MHz up to 20MHz, in many spectrum bands and for both FDD and TDD deployments. This means that an operator can introduce LTE in both new and existing bands.
  • 143. K025 LTE Technology for Engineers Page 151 LTE Basic Air Interface LTE supports a range of bandwidths up to 20 MHz, as depicted above. LTE also supports devices that can work on various system-bandwidth combinations, therefore reducing the need to tailor specific device profiles to each combination. This allows an operator to deploy LTE in 10 or 20 MHz combinations, without worrying about device-compatibility issues. LTE devices are mandated to support 20 MHz bandwidth in the DL and the UL. The available peak rates and average user rates for an individual user, however, scale with the deployment bandwidth. LTE supports both FDD and TDD modes, allowing operators to address all available spectrum resources.
  • 144. Page 152 K025 LTE Technology for Engineers LTE Basic Air Interface 4.6Slot Structure and Physical Resources The subcarriers in LTE have a constant spacing of f = 15 kHz. In the frequency domain, 12 subcarriers form one resource block. The resource block size is the same for all bandwidths. To each OFDM symbol, a cyclic prefix (CP) is appended as guard time. One downlink slot consists of 6 or 7 OFDM symbols, depending on whether extended or normal cyclic prefix is configured respectively. The extended cyclic prefix is able to cover larger cell sizes with higher delay spread of the radio channel.
  • 145. K025 LTE Technology for Engineers Page 153 LTE Basic Air Interface Data symbols are independently modulated and transmitted over a high number of closely spaced orthogonal subcarriers. In E-UTRA, downlink modulation schemes QPSK, 16QAM, and 64QAM are available.
  • 146. Page 154 K025 LTE Technology for Engineers LTE Basic Air Interface
  • 147. K025 LTE Technology for Engineers Page 155 LTE Basic Air Interface 4.6.1 Transmission Bandwidths LTE must support the international wireless market and regional spectrum regulations and spectrum availability. To this end the specifications include variable channel bandwidths selectable from 1.4 to 20 MHz, with subcarrier spacing of 15 kHz. If the new LTE eMBMS is used, a subcarrier spacing of 7.5 kHz is also possible. Subcarrier spacing is constant regardless of the channel bandwidth. 3GPP has defined the LTE air interface to be "bandwidth agnostic," which allows the air interface to adapt to different channel bandwidths with minimal impact on system operation. The smallest amount of resource that can be allocated in the uplink or downlink is called a resource block (RB). An RB is 180 kHz wide and lasts for one 0.5 ms timeslot. For standard LTE, an RB comprises 12 subcarriers at a 15 kHz spacing, and for eMBMS with the optional 7.5 kHz subcarrier spacing an RB comprises 24 subcarriers for 0.5 ms. The maximum number of RBs supported by each transmission bandwidth is given above.
  • 148. Page 156 K025 LTE Technology for Engineers LTE Basic Air Interface 4.7Orthagonality Depending on the required data rate, each UE can be assigned one or more resource blocks in each transmission time interval of 1 ms. The scheduling decision is made in the base station (eNodeB).
  • 149. K025 LTE Technology for Engineers Page 157 LTE Basic Air Interface For standard LTE, an RB comprises 12 subcarriers at a 15 kHz spacing, and for eMBMS with the optional 7.5 kHz subcarrier spacing an RB comprises 24 subcarriers for 0.5 ms.
  • 150. Page 158 K025 LTE Technology for Engineers LTE Basic Air Interface 4.7.1 Single-Frequency Network Multicast Services LTE specifies a high-capacity multicast and broadcast service, using a single- frequency network (also called multicast-broadcast single-frequency network or MBSFN). As depicted above, all cells in the network (or a geographical area) transmit time-synchronized, identical DL signals. At the user terminal, these multiple time- synchronized transmissions appear as a single transmission with high signal strength, and thus can be easily decoded. In addition to the benefits of time-synchronised transmissions, the robustness of OFDM to multipath propagation ensures that the inter-cell interference is reduced. The capacity benefits of the single-frequency network are highest when the same content is transmitted in all cells of the macro network.
  • 151. K025 LTE Technology for Engineers Page 159 LTE Basic Air Interface
  • 152. Page 160 K025 LTE Technology for Engineers LTE Basic Air Interface 4.7.2 Single Carrier Frequency Division Multiple Access (SC- FDMA) LTE has ambitious requirements for data rate, capacity, spectrum efficiency, and latency. In order to fulfill these requirements, LTE is based on new technical principles. LTE uses new multiple access schemes on the air interface: OFDMA (Orthogonal Frequency Division Multiple Access) in downlink and SC-FDMA (Single Carrier Frequency Division Multiple Access) in uplink. While OFDMA is seen optimum to fulfil the LTE requirements in downlink, OFDMA properties are less favourable for the uplink. This is mainly due to weaker peak-to- average power ratio (PAPR) properties of an OFDMA signal, resulting in worse uplink coverage. Thus, the LTE uplink transmission scheme for FDD and TDD mode is based on SC- FDMA (Single Carrier Frequency Division Multiple Access) with cyclic prefix. SC-FDMA signals have better PAPR properties compared to an OFDMA signal. This was one of the main reasons for selecting SCFDMA as LTE uplink access scheme. The PAPR characteristics are important for cost-effective design of UE power amplifiers.
  • 153. K025 LTE Technology for Engineers Page 161 LTE Basic Air Interface
  • 154. Page 162 K025 LTE Technology for Engineers LTE Basic Air Interface 4.8Cyclic Prefix In the time domain, a guard interval may be added to each symbol to combat inter- OFDM-symbol-interference due to channel delay spread. In EUTRA, the guard interval is a cyclic prefix which is inserted prior to each OFDM symbol. Delay spread is a type of distortion that is caused when an identical signal arrives at different times at its destination. The signal usually arrives via multiple paths and with different angles of arrival. The time difference between the arrival moment of the first multipath component (typically the Line of sight component) and the last one, is called delay spread.
  • 155. K025 LTE Technology for Engineers Page 163 LTE Basic Air Interface 4.9Delay Spread The data to be transmitted on an OFDM signal is spread across the carriers of the signal, each carrier taking part of the payload. This reduces the data rate taken by each carrier. The lower data rate has the advantage that interference from reflections is much less critical. This is achieved by adding a guard band time or guard interval into the system. This ensures that the data is only sampled when the signal is stable and no new delayed signals arrive that would alter the timing and phase of the signal. The distribution of the data across a large number of carriers in the OFDM signal has some further advantages. Nulls caused by multi-path effects or interference on a given frequency only affect a small number of the carriers, the remaining ones being received correctly. By using error-coding techniques, which does mean adding further data to the transmitted signal, it enables many or all of the corrupted data to be reconstructed within the receiver. This can be done because the error correction code is transmitted in a different part of the signal. It is this error coding which is referred to in the "Coded" word in the title of COFDM which is often seen.
  • 156. Page 164 K025 LTE Technology for Engineers LTE Basic Air Interface
  • 157. K025 LTE Technology for Engineers Page 165 LTE Basic Air Interface To each OFDM symbol, a cyclic prefix (CP) is appended as guard time. One downlink slot consists of 6 or 7 OFDM symbols, depending on whether extended or normal cyclic prefix is configured, respectively. The extended cyclic prefix is able to cover larger cell sizes with higher delay spread of the radio channel.
  • 158. Page 166 K025 LTE Technology for Engineers LTE Basic Air Interface 4.10 Slot Structure and Physical Resources Data is allocated to the UEs in terms of resource blocks, i.e. one UE can be allocated integer multiples of one resource block in the frequency domain. These resource blocks do not have to be adjacent to each other. In the time domain, the scheduling decision can be modified every transmission time interval of 1 ms. The scheduling decision is done in the base station (eNodeB). The scheduling algorithm has to take into account the radio link quality situation of different users, the overall interference situation, Quality of Service requirements, service priorities, and so on.
  • 159. K025 LTE Technology for Engineers Page 167 LTE Basic Air Interface 4.11 Scheduler Scheduler in eNB (base station) allocates resource blocks (which are the smallest elements of resource allocation) to users for predetermined amount of time. Slots consist of either 6 (for long cyclic prefix) or 7 (for short cyclic prefix) OFDM symbols Longer cyclic prefixes are desired to address longer fading. The number of available subcarriers changes depending on transmission bandwidth (but subcarrier spacing is fixed).
  • 160. Page 168 K025 LTE Technology for Engineers LTE Basic Air Interface Round Robin The aim of this scheduler is to share the available/unused resources equally among the RT terminals (i.e. the terminals requesting RT services) in order to satisfy their RT- MBR demand. This is a recursive algorithm and continues to share resources equally among RT terminals, until all RT-MBR demands have been met or there are no more resources left to allocate Proportional Fair The aim of this Scheduler is to allocate the available/unused resources as fairly as possible in such a way that, on average, each terminal gets the highest possible throughput achievable under the channel conditions. This is a recursive algorithm. The remaining resources are shared between the RT terminals in proportion to their bearer data rates. Terminals with higher data rates get a larger share of the available resources. Each terminal gets either the resources it needs to satisfy its RT-MBR demand, or its weighted portion of the available/unused resources, whichever is smaller. This recursive allocation process continues until all RT-MBR demands have been met or there are no more resources left to allocate.
  • 161. K025 LTE Technology for Engineers Page 169 LTE Basic Air Interface Proportional Demand The aim of this scheduler is to allocate the remaining unused resources to RT terminals in proportion to their additional resource demands. This is a non-recursive allocation process and results in either satisfying the RT-MBR demands of all terminals or the consumption of all of the resources.
  • 162. Page 170 K025 LTE Technology for Engineers LTE Basic Air Interface Max SINR The aim of this Scheduler is to maximise the terminal throughput and, in turn, the average cell throughput. This is a non-recursive resource allocation process, where terminals with higher bearer rates (and consequently higher SINR) are preferred over terminals with lower bearer rates (and consequently lower SINR). This means that resources are allocated first to those terminals with better SINR/channel conditions, thereby maximising the throughput.
  • 163. K025 LTE Technology for Engineers Page 171 LTE Basic Air Interface
  • 164. Page 172 K025 LTE Technology for Engineers LTE Basic Air Interface 4.12 ASSET - LTE
  • 165. K025 LTE Technology for Engineers Page 173 LTE Basic Air Interface 4.13 Downlink Data Transmission Data is allocated to the UEs in terms of resource blocks. A physical resource block consists of 12 (24) consecutive sub-carriers in the frequency domain for the Nf=15 kHz (Nf=7.5 kHz) case. In the time domain, a physical resource block consists of DL Nsymb consecutive OFDM symbols, DL Nsymb is equal to the number of OFDM symbols in a slot. Depending on the required data rate, each UE can be assigned one or more resource blocks in each transmission time interval of 1 ms. The scheduling decision is done in the base station (eNodeB).
  • 166. Page 174 K025 LTE Technology for Engineers LTE Basic Air Interface The user data is carried on the Physical Downlink Shared Channel (PDSCH).
  • 167. K025 LTE Technology for Engineers Page 175 LTE Basic Air Interface 4.14 Modulation and Subcarriers
  • 168. Page 176 K025 LTE Technology for Engineers LTE Basic Air Interface
  • 169. K025 LTE Technology for Engineers Page 177 LTE Basic Air Interface 4.15 Downlink Reference Signal Structure
  • 170. Page 178 K025 LTE Technology for Engineers LTE Basic Air Interface 4.15.1 Configuration of Carrier
  • 171. K025 LTE Technology for Engineers Page 179 LTE Basic Air Interface
  • 172. Page 180 K025 LTE Technology for Engineers LTE Basic Air Interface
  • 173. K025 LTE Technology for Engineers Page 181 LTE Basic Air Interface 4.16 Reference Signal Received Power (RSRP) Reference Signal Received Power (RSRP), is determined for a considered cell as the linear average over the power contributions (in [W]) of the resource elements that carry cell-specific reference signals within the considered measurement frequency bandwidth. For RSRP determination, the cell-specific reference signals R0 and, if available, R1 can be used. If receiver diversity is in use by the UE, the reported value shall not be lower than the corresponding RSRP of any of the individual diversity branches. E-UTRA Carrier RSSI E-UTRA Carrier Received Signal Strength Indicator, comprises the total received wideband power observed by the UE from all sources, including co-channel serving and non-serving cells, adjacent channel interference, thermal noise and so on. Reference Signal Received Quality (RSRQ) RSRQ is defined as the ratio N×RSRP / (E-UTRA carrier RSSI), where N is the number of RBs of the E-UTRA carrier RSSI measurement bandwidth. The measurements in the numerator and denominator shall be made over the same set of resource blocks.
  • 174. Page 182 K025 LTE Technology for Engineers LTE Basic Air Interface
  • 175. K025 LTE Technology for Engineers Page 183 LTE Basic Air Interface 4.17 Channel Quality Indicator Reporting
  • 176. Page 184 K025 LTE Technology for Engineers LTE Basic Air Interface
  • 177. K025 LTE Technology for Engineers Page 185 LTE Basic Air Interface
  • 178. Page 186 K025 LTE Technology for Engineers LTE Basic Air Interface
  • 179. K025 LTE Technology for Engineers Page 187 LTE Basic Air Interface 4.18 Downlink Shared Channel (DL-SCH)
  • 180. Page 188 K025 LTE Technology for Engineers LTE Basic Air Interface 4.18.1 Physical Cell Identity (PCI)
  • 181. K025 LTE Technology for Engineers Page 189 LTE Basic Air Interface 4.18.2 Physical Downlink Control Channel
  • 182. Page 190 K025 LTE Technology for Engineers LTE Basic Air Interface 4.19 Questions
  • 183. K025 LTE Technology for Engineers Page 191 LTE Network Architecture and Protocols 5 LTE Network Architecture and Protocols C H A P T E R 5
  • 184. Page 192 K025 LTE Technology for Engineers LTE Network Architecture and Protocols 5.1LTE Architecture LTE capabilities include:  Downlink peak data rates up to 326 Mbps with 20 MHz bandwidth.  Uplink peak data rates up to 86.4 Mbps with 20 MHz bandwidth.  Operation in both TDD and FDD modes.  Scalable bandwidth up to 20 MHz, covering 1.25, 2.5, 5, 10, 15, and 20 MHz in the study phase.  Reduced latency, to 10 msec round-trip time between user equipment and the base station, and to less than 100 msec transition time from inactive to active. The overall intent is to provide an extremely high-performance radio-access technology that offers full vehicular speed mobility and that can readily coexist with HSPA and earlier networks. Because of scalable bandwidth, operators will be able to easily migrate their networks and users from HSPA to LTE over time.
  • 185. K025 LTE Technology for Engineers Page 193 LTE Network Architecture and Protocols
  • 186. Page 194 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 187. K025 LTE Technology for Engineers Page 195 LTE Network Architecture and Protocols 5.2Roaming Architecture A network run by one operator in one country is known as a Public Land Mobile Network (PLMN). Roaming is where users are allowed to connect to PLMNs other than those to which they are directly subscribed.
  • 188. Page 196 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 189. K025 LTE Technology for Engineers Page 197 LTE Network Architecture and Protocols
  • 190. Page 198 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 191. K025 LTE Technology for Engineers Page 199 LTE Network Architecture and Protocols 5.3Bearer Establishment Procedure
  • 192. Page 200 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 193. K025 LTE Technology for Engineers Page 201 LTE Network Architecture and Protocols
  • 194. Page 202 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 195. K025 LTE Technology for Engineers Page 203 LTE Network Architecture and Protocols
  • 196. Page 204 K025 LTE Technology for Engineers LTE Network Architecture and Protocols 5.4KPI-RAB Success
  • 197. K025 LTE Technology for Engineers Page 205 LTE Network Architecture and Protocols 5.5KPI – Dropped Call Ratio
  • 198. Page 206 K025 LTE Technology for Engineers LTE Network Architecture and Protocols Radio Bearer Reconfiguration procedure allows the modification of the following parameters: DRX/DTX Re-configuration for UE in RRC_CONNECTED state (Radio Bearer Reconfiguration procedure is used to reconfigure the RRC Connection.) Modification of QoS parameters (QoS parameters are listed below).  Modification of long lived PRB allocation  Modification of fixed MCS allocation QoS definitions for Radio Bearers which can be modified are listed below:  QoS-Label/ QoS Profile ID  UL Guaranteed Bit rate[1]GBR  UL Maximum Bit rate[2]  DL Guaranteed Bit rate GBR  DL Maximum Bit rate  Allocation / Retention Priority [1] Guaranteed bit rate (GBR) specifies the guaranteed number of bits delivered by E- UTRA within a period of time (provided there is data to deliver). [2] Maximum bit rate (MBR) specifies a maximum number of bits delivered by UMTS within a period of time
  • 199. K025 LTE Technology for Engineers Page 207 LTE Network Architecture and Protocols
  • 200. Page 208 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 201. K025 LTE Technology for Engineers Page 209 LTE Network Architecture and Protocols
  • 202. Page 210 K025 LTE Technology for Engineers LTE Network Architecture and Protocols 5.6The Home Subscriber Service The HSS contains users’ SAE subscription data such as the EPS-subscribed QoS profile and any access restrictions for roaming. It also holds information about the PDNs to which the user can connect. This could be in the form of an Access Point Name (APN) (which is a label according to DNS1 naming conventions describing the access point to the PDN), or a PDN Address (indicating subscribed IP address(es)). In addition, the HLR holds dynamic information such as the identity of the MME to which the user is currently attached or registered. The HLR may also integrate the Authentication Centre (AuC) which generates the vectors for authentication and security keys. Security functions are the responsibility of the MME for both signalling and user data. When a UE attaches with the network, a mutual authentication of the UE and the network is performed between the UE and the MME/HSS. This authentication function also establishes the security keys which are used for encryption of the bearers. All data sent over the radio interface is encrypted
  • 203. K025 LTE Technology for Engineers Page 211 LTE Network Architecture and Protocols
  • 204. Page 212 K025 LTE Technology for Engineers LTE Network Architecture and Protocols 5.7PDN Gateway
  • 205. K025 LTE Technology for Engineers Page 213 LTE Network Architecture and Protocols
  • 206. Page 214 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 207. K025 LTE Technology for Engineers Page 215 LTE Network Architecture and Protocols
  • 208. Page 216 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 209. K025 LTE Technology for Engineers Page 217 LTE Network Architecture and Protocols 5.8Network Sharing The LTE architecture enables service providers to reduce the cost of owning and operating the network by allowing the service providers to have separate CN (MME, SGW, PDN GW) while the E-UTRAN (eNBs) is jointly shared by them. This is enabled by the S1-flex mechanism by enabling each eNB to be connected to multiple CN entities. When a UE attaches to the network, it is connected to the appropriate CN entities based on the identity of the service provider sent by the UE.
  • 210. Page 218 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 211. K025 LTE Technology for Engineers Page 219 LTE Network Architecture and Protocols 5.9Session Initiation Protocol Architecture
  • 212. Page 220 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 213. K025 LTE Technology for Engineers Page 221 LTE Network Architecture and Protocols
  • 214. Page 222 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 215. K025 LTE Technology for Engineers Page 223 LTE Network Architecture and Protocols
  • 216. Page 224 K025 LTE Technology for Engineers LTE Network Architecture and Protocols 5.10 LTE Functional Nodes Radio Resource Management: Radio Bearer Control, Radio Admission Control, Connection Bearer control is the allocation of resources to the UE, so the number of sub carriers, coding scheme, power levels and so on. Mobility Control, Dynamic allocation of resources to UEs in both UL and DL (scheduling). Mobility control includes handovers, which can now be achieved in some LTE cases without the need for any decision making (and minimal signalling) by the Core Network. The allocation of resources to the UE includes the number of sub carriers, coding scheme, power levels and so on. Obviously, this includes load sharing, enabling everyone in the cell to get appropriate resources depending on the number of users in the cell and cell capacity. IP header compression and encryption of user data stream. Header compression allows more user data information to be sent rather than using resources. The purpose of IP header compression algorithm is to improve the ratio of the overhead versus the payload for an IP packet. It is of tremendous importance since the increase of the address space when shifting to IPv6 translates into an increase of the header size.
  • 217. K025 LTE Technology for Engineers Page 225 LTE Network Architecture and Protocols All data will be encrypted for over the air transmission, ensuring user confidentiality. Scheduling and transmission of paging messages (from the MME); A UE will have to be paged when there is data to send to it or when an incoming phone call is being made. mobility and scheduling. UEs inform the network which cells it is receiving and the power level and quality of those signals. The eNB can provide the UE assistance, by providing a list of frequencies, scrambling codes (UTRAN) etc, and perhaps even a list of preferred networks and specific frequencies to measure. We will talk more about this later.
  • 218. Page 226 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 219. K025 LTE Technology for Engineers Page 227 LTE Network Architecture and Protocols 5.11 Physical Channels, Transport Channels & Logical Channels
  • 220. Page 228 K025 LTE Technology for Engineers LTE Network Architecture and Protocols 5.11.1 Logical Channels
  • 221. K025 LTE Technology for Engineers Page 229 LTE Network Architecture and Protocols
  • 222. Page 230 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 223. K025 LTE Technology for Engineers Page 231 LTE Network Architecture and Protocols 5.11.2 Transport Channels The LTE transport channels vary between the uplink and the downlink, as each has different requirements and operates in a different manner. Physical layer transport channels offer information transfer to medium access control (MAC) and higher layers. Broadcast Channel (BCH): The LTE transport channel maps to Broadcast Control Channel (BCCH) Downlink Shared Channel (DL-SCH):This transport channel is the main channel for downlink data transfer. It is used by many logical channels. Paging Channel (PCH): To convey the PCCH Multicast Channel (MCH): This transport channel is used to transmit MCCH information to set up multicast transmissions
  • 224. Page 232 K025 LTE Technology for Engineers LTE Network Architecture and Protocols Downlink Transport Channels BCH (Broadcast Channel): It has a fixed transport format, provided by the specifications. It is used for transmission of the information on the BCCH logical channel. It can be characterised by fixed, predefined transport format and the requirement to be broadcast in the entire coverage area of the cell. DLSCH (Downlink Shared Channel): DL-SCH is the transport channel used for transmission of downlink data in LTE. It supports LTE features such as dynamic rate adaptation and channel dependent scheduling in the time and frequency domain, hybrid ARQ, and spatial multiplexing. PCH (Paging Channel): It is used for transmission of paging information on the PCCH logical channel. The PCH supports DRX to allow the mobile terminal to save battery power by sleeping and waking up to receive the PCH only at predefined time instances. MCH (Multicast Channel): It is used to support MBMS. It is characterised by a semi-static transport format and semi-static scheduling. In case of multi-cell transmission using MBSFN, the scheduling and transport format configuration is coordinated among the cells involved in the MBSFN transmission Uplink Transport Channels UL-SCH (Uplink Shared Channel): It is characterised by the possibility to use beamforming; support for HARQ, dynamic link adaptation by varying the transmit power and potentially modulation and coding and also for both dynamic and semi-static resource allocation. RACH (Random Access Channel(s)): It is characterised by limited control information and collision risk. The possibility of using open loop power control depends on the physical layer solution.
  • 225. K025 LTE Technology for Engineers Page 233 LTE Network Architecture and Protocols
  • 226. Page 234 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 227. K025 LTE Technology for Engineers Page 235 LTE Network Architecture and Protocols 5.11.3 Physical Channels PBCH (Physical Broadcast Channel): The coded BCH transport block is mapped to four subframes within a 40 ms interval. This 40 ms timing is blindly detected, i.e. there is no explicit signalling indicating 40 ms timing. Each subframe is assumed to be self-decodable, i.e. the BCH can be decoded from a single reception, assuming sufficiently good channel conditions.
  • 228. Page 236 K025 LTE Technology for Engineers LTE Network Architecture and Protocols Physical Broadcast Channel (PBCH): This physical channel carries system information for UEs requiring to access the network. Physical Downlink Control Channel (PDCCH): The main purpose of this physical channel is to carry mainly scheduling information. Physical Hybrid ARQ Indicator Channel (PHICH): As the name implies, this channel is used to report the Hybrid ARQ status. Physical Downlink Shared Channel (PDSCH): This channel is used for unicast and paging functions. Physical Multicast Channel (PMCH): This physical channel carries system information for multicast purposes. Physical Control Format Indicator Channel (PCFICH): This provides information to enable the UEs to decode the PDSCH
  • 229. K025 LTE Technology for Engineers Page 237 LTE Network Architecture and Protocols
  • 230. Page 238 K025 LTE Technology for Engineers LTE Network Architecture and Protocols 5.12 Modulation and Coding
  • 231. K025 LTE Technology for Engineers Page 239 LTE Network Architecture and Protocols 5.12.1 PDSCH
  • 232. Page 240 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 233. K025 LTE Technology for Engineers Page 241 LTE Network Architecture and Protocols 5.12.2 PUSCH PUSCH (Physical Uplink Shared Channel): Carries the UL-SCH data, CQI, PMI and RI. RI (Rank Indicator): RI indicates the number of spatial layers that can be supported by the UE, based on the channel conditions. The transmission rank selected to be used is dependent on RI as well as other factors (depending on the vendor) such as traffic pattern, available transmission bandwidth and so on. RI is compulsory for both open and closed loop spatial multiplexing. PMI (Precoding Matrix Indicator): PMI ensures that the correct spatial domain precoding matrix is applied by the eNodeB so that the transmitted signal matches with the spatial channel experienced by the UE. It is denoted by the Transmit Precoding Matrix Indicator (TPMI) that consists of 3 bit or 6 bit information field for 2 or 4 transmit antennas, respectively. It is compulsory for closed loop spatial multiplexing. CQI (Channel Quality Indicator): It is a 4 bit index pointing into a table of 16 different modulation and coding schemes. It indicates or suggests a combination of modulation and coding scheme that the eNodeB should use to ensure that the BLER (Block Error Ratio) experienced by the UE remains less than 10%.
  • 234. Page 242 K025 LTE Technology for Engineers LTE Network Architecture and Protocols 5.13 Functional Nodes
  • 235. K025 LTE Technology for Engineers Page 243 LTE Network Architecture and Protocols 5.13.1 Functional Nodes - UE
  • 236. Page 244 K025 LTE Technology for Engineers LTE Network Architecture and Protocols 5.13.2 Functional Nodes - eNodeB
  • 237. K025 LTE Technology for Engineers Page 245 LTE Network Architecture and Protocols 5.14 RLC Modes
  • 238. Page 246 K025 LTE Technology for Engineers LTE Network Architecture and Protocols 5.14.1 RLC Modes - Qos
  • 239. K025 LTE Technology for Engineers Page 247 LTE Network Architecture and Protocols 5.15 Medium Access Control (MAC) PDCCH (Physical Downlink Control Channel): Informs the UE about the resource allocation of PCH and DL-SCH, and Hybrid ARQ information related to DL-SCH. It also carries the uplink scheduling grant. The downlink control signalling (PDCCH) is located in the first n OFDM symbols where n ≤ 3 and consists of:  Transport format, resource allocation, and hybrid-ARQ information related to DL- SCH, and PCH  Transport format, resource allocation, and hybrid-ARQ information related to UL- SCH  QPSK modulation is used for all control channels
  • 240. Page 248 K025 LTE Technology for Engineers LTE Network Architecture and Protocols QoS differentiation, i.e. prioritisation of different services according to their requirements becomes extremely important when the system load gets higher. The most relevant parameters of QoS classes are: Transfer Delay: This represents how delay-sensitive the traffic is. For example, the VoIP class is meant for very delay sensitive traffic, while the P2P File Sharing class is delay- insensitive. Guaranteed Bit rate: Delay sensitive QoS Classes have guaranteed bit rate requirements. This defines the minimum bearer bit rate that the E-UTRAN must provide and it can be used in admission control and in resource allocation. Each guaranteed bit rate service also has a maximum bit rate demand, i.e. it can't exceed this limit. Allocation and Retention Priority (ARP): Within each QoS class there are different allocation and retention priorities. The primary purpose of ARP is to decide whether a bearer establishment/modification request can be accepted or needs to be rejected in case of resource limitations (typically available radio capacity in case of GBR bearers). In addition, the ARP can be used (for example, by the eNodeB) to decide which bearer(s) to drop during exceptional resource limitations (for example, at handover). It is important to remember that pure prioritisation in packet scheduling alone is not enough to provide full QoS differentiation gains. Users within the same QoS class and ARP class will share the available capacity. If the number of users is simply too high, then they will suffer from bad quality. In that case it is better to block a few users to guarantee the quality of existing connections, like streaming videos. The radio network can estimate the available radio capacity and block an incoming user.
  • 241. K025 LTE Technology for Engineers Page 249 LTE Network Architecture and Protocols
  • 242. Page 250 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 243. K025 LTE Technology for Engineers Page 251 LTE Network Architecture and Protocols 5.16 Physical Control Channel
  • 244. Page 252 K025 LTE Technology for Engineers LTE Network Architecture and Protocols 5.16.1 Physical Downlink Control Channel
  • 245. K025 LTE Technology for Engineers Page 253 LTE Network Architecture and Protocols
  • 246. Page 254 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 247. K025 LTE Technology for Engineers Page 255 LTE Network Architecture and Protocols
  • 248. Page 256 K025 LTE Technology for Engineers LTE Network Architecture and Protocols PCFICH (Physical Control Format Indicator Channel): Informs the UE about the number of OFDM symbols used for the PDCCHs. It is transmitted in every subframe.
  • 249. K025 LTE Technology for Engineers Page 257 LTE Network Architecture and Protocols 5.17 Multimedia Broadcast/Multicast Service (MBMS)
  • 250. Page 258 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 251. K025 LTE Technology for Engineers Page 259 LTE Network Architecture and Protocols
  • 252. Page 260 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 253. K025 LTE Technology for Engineers Page 261 LTE Network Architecture and Protocols
  • 254. Page 262 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 255. K025 LTE Technology for Engineers Page 263 LTE Network Architecture and Protocols
  • 256. Page 264 K025 LTE Technology for Engineers LTE Network Architecture and Protocols 5.18 Reference Signal Received Power (RSRP) Physical Layer Measurements and Indicators Reference Signal Received Power (RSRP), is determined for a considered cell as the linear average over the power contributions (in [W]) of the resource elements that carry cell-specific reference signals within the considered measurement frequency bandwidth. For RSRP determination, the cell-specific reference signals R0 and, if available, R1 can be used. If receiver diversity is in use by the UE, the reported value shall not be lower than the corresponding RSRP of any of the individual diversity branches. E-UTRA Carrier RSSI E-UTRA Carrier Received Signal Strength Indicator, comprises the total received wideband power observed by the UE from all sources, including co-channel serving and non-serving cells, adjacent channel interference, thermal noise and so on. Reference Signal Received Quality (RSRQ) RSRQ is defined as the ratio N×RSRP / (E-UTRA carrier RSSI), where N is the number of RB’s of the E-UTRA carrier RSSI measurement bandwidth. The measurements in the numerator and denominator shall be made over the same set of resource blocks.
  • 257. K025 LTE Technology for Engineers Page 265 LTE Network Architecture and Protocols
  • 258. Page 266 K025 LTE Technology for Engineers LTE Network Architecture and Protocols 5.19 Quality Channel Indicator Reporting
  • 259. K025 LTE Technology for Engineers Page 267 LTE Network Architecture and Protocols
  • 260. Page 268 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 261. K025 LTE Technology for Engineers Page 269 LTE Network Architecture and Protocols
  • 262. Page 270 K025 LTE Technology for Engineers LTE Network Architecture and Protocols
  • 263. K025 LTE Technology for Engineers Page 271 Mobility Management 6 Mobility Management 6.1UE States C H A P T E R 6
  • 264. Page 272 K025 LTE Technology for Engineers Mobility Management Co-existence with legacy standards and systems: LTE users should be able to make voice calls from their terminal and have access to basic data services even when they are in areas without LTE coverage. LTE therefore allows smooth, seamless service handover in areas of HSPA, WCDMA or GSM/GPRS/EDGE coverage. Furthermore, LTE/SAE supports not only intra-system and intersystem handovers, but inter-domain handovers between packet switched and circuit switched sessions.
  • 265. K025 LTE Technology for Engineers Page 273 Mobility Management 6.2UE Power-up
  • 266. Page 274 K025 LTE Technology for Engineers Mobility Management
  • 267. K025 LTE Technology for Engineers Page 275 Mobility Management 6.2.1 EPS Mobility Management
  • 268. Page 276 K025 LTE Technology for Engineers Mobility Management
  • 269. K025 LTE Technology for Engineers Page 277 Mobility Management 6.2.2 Tracking Area Update
  • 270. Page 278 K025 LTE Technology for Engineers Mobility Management
  • 271. K025 LTE Technology for Engineers Page 279 Mobility Management 6.3LTE Functional Modes - MME
  • 272. Page 280 K025 LTE Technology for Engineers Mobility Management
  • 273. K025 LTE Technology for Engineers Page 281 Mobility Management
  • 274. Page 282 K025 LTE Technology for Engineers Mobility Management 6.4RRC States In order to provide seamless service continuity, ensuring mobility between LTE and legacy technologies is therefore very important. These technologies include GSM/GPRS and WCDMA/HSPA.
  • 275. K025 LTE Technology for Engineers Page 283 Mobility Management
  • 276. Page 284 K025 LTE Technology for Engineers Mobility Management
  • 277. K025 LTE Technology for Engineers Page 285 Mobility Management
  • 278. Page 286 K025 LTE Technology for Engineers Mobility Management
  • 279. K025 LTE Technology for Engineers Page 287 Mobility Management
  • 280. Page 288 K025 LTE Technology for Engineers Mobility Management
  • 281. K025 LTE Technology for Engineers Page 289 Mobility Management
  • 282. Page 290 K025 LTE Technology for Engineers Mobility Management
  • 283. K025 LTE Technology for Engineers Page 291 Mobility Management
  • 284. Page 292 K025 LTE Technology for Engineers Mobility Management
  • 285. K025 LTE Technology for Engineers Page 293 Mobility Management
  • 286. Page 294 K025 LTE Technology for Engineers Mobility Management