This document summarizes the steps in a 3G-UMTS originating call. It describes the setup of radio bearers and RANAP signaling in detail. The call involves establishing an RRC connection between the UE and RNC, authentication and security procedures between the UE and core network, setting up a voice radio access bearer, and connecting the call before releasing resources at the end.
Fast detection of number of antenna ports in lte systemeSAT Journals
Abstract
In LTE system, during initial cell selection UE is unaware about the number of antennas used by eNB for transmission. So, UE blindly tries multiple times to detect the right number of antennas used for transmission in the system. This wastes lot of time and UE processing power, as UE needs to do channel estimation, equalization/demodulation, decoding process multiple times with assumption of 1 or 2 and 4 antenna ports each time.
The objective of this paper is to find out a faster and efficient method for detecting the number of antenna ports used by the eNB for signal transmission. A new method is explored for detecting the number of eNB transmit antennas before starting PBCH decoding and CRC checking by exploiting the presence of downlink reference signals at various Resource Element (RE) positions in the Resource Blocks (RB) and using the PBCH SFBC data patterns. This helps for faster detection of number of antennas used for transmission that in turn helps to reduce the UE power consumption as well as reduces the initial cell search time.
Keywords: UE- User Equipment, LTE- Long-Term Evolution, eNB- evolved Node B, RAT- Radio Access Technology, PBCH- Physical Broadcast Channel, SFBC- Space Frequency Block Codes, DL – Down Link.
It is a handbook of UMTS/WCDMA call flows for PS services.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
Fast detection of number of antenna ports in lte systemeSAT Journals
Abstract
In LTE system, during initial cell selection UE is unaware about the number of antennas used by eNB for transmission. So, UE blindly tries multiple times to detect the right number of antennas used for transmission in the system. This wastes lot of time and UE processing power, as UE needs to do channel estimation, equalization/demodulation, decoding process multiple times with assumption of 1 or 2 and 4 antenna ports each time.
The objective of this paper is to find out a faster and efficient method for detecting the number of antenna ports used by the eNB for signal transmission. A new method is explored for detecting the number of eNB transmit antennas before starting PBCH decoding and CRC checking by exploiting the presence of downlink reference signals at various Resource Element (RE) positions in the Resource Blocks (RB) and using the PBCH SFBC data patterns. This helps for faster detection of number of antennas used for transmission that in turn helps to reduce the UE power consumption as well as reduces the initial cell search time.
Keywords: UE- User Equipment, LTE- Long-Term Evolution, eNB- evolved Node B, RAT- Radio Access Technology, PBCH- Physical Broadcast Channel, SFBC- Space Frequency Block Codes, DL – Down Link.
It is a handbook of UMTS/WCDMA call flows for PS services.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
A very simple and interesting schemes which give you a chance to understand how it works the CALL FLOW / DATA FLOW procedures in UMTS Radiomobile Network
XPDS13: On Paravirualizing TCP - Congestion Control on Xen VMs - Luwei Cheng,...The Linux Foundation
While datacenters are increasingly adopting VMs to provide elastic cloud services, they still rely on traditional TCP for congestion control. In this talk, I will first show that VM scheduling delays can heavily contaminate RTTs sensed by VM senders, preventing TCP from correctly learning the physical network condition. Focusing on the incast problem, which is commonly seen in large-scale distributed data processing such as MapReduce and web search, I find that the solutions that have been developed for *physical* clusters fall short in a Xen *virtual* cluster. Second, I will provide a concrete understanding of the problem, and reveal that the situations that when the sending VM is preempted versus when the receiving VM is preempted, are different. Third, I will introduce my recent attempts on paravirtualizing TCP to overcome the negative effect caused by VM scheduling delays.
Many applications are network I/O bound, including common database-based applications and service-based architectures. But operating systems and applications are often untuned to deliver high performance. This session uncovers hidden issues that lead to low network performance, and shows you how to overcome them to obtain the best network performance possible.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
1. 3G-UMTS Call Flow (Originating Call)
User
Equipment
UE-RNC Sessions UTRAN RNC-Core Network Sessions Core
Network
UE RNC MSC/VLR
EventStudio System Designer
06-Oct-13 07:24 (Page 1)
A 3G-UMTS originating call is described here. Setup radio bearers and RANAP signaling are covered in detail. You can click
on most RANAP messages to see the full content of the message.
This call flow has been generated with from a Wireshark PCAP file using VisualEther (http://www.eventhelix.com/VisualEther/).
The generated call flow was later modified with EventStudio (http://www.eventhelix.com/EventStudio/) to add comments and
terminal level interactions.
rrc rrc
RRC Connection Request
UE Identity,
UE Capabilities,
Establishment Cause
UE wishes to establish a
voice call so it requests a
Radio Resource Control
(RRC) connection.
rrcrrc
RRC Connection Setup
Transport Channel Information,
Signaling Radio Bearer
The RNC accepts the RRC
Connection Request and
assigns a traffic channel.
The message also creates a
Signaling Radio Bearer
(SRB).
rrc rrc
RRC Connection Complete
Ciphering Information
The UE responds back to
signal the completion of the
RRC Connection Setup.
RRC RRC Connection Setup has
been completed between the
UE and the RNC. Signaling
Radio Bearer (SRB) is also
created at the time of the
RRC connection setup.
RRC Connection Setup
rrc rrc
Initial UE Message [CM Service Request] The mobile sends an Initial
UE Message that carries the
CM Service Request as a
NAS (Non Access Stratum)
payload.
ranap ranap
DTAP MM CM Service Request
BCD Digits : 123456780000000
The CM Service Request is
the first message to be
received for the call from the
RNC. This message also
sets up the SCCP
connection between the
RNC and the Core Network.
The "CM Service Request"
also marks the start of an Iu
connection.
SCTP SACK The Core Network sends an
SCTP level ack for the CM
Service Request message.
SCCP Connection Confirm SCCP connection setup is
confirmed.
SCTP SACK SCTP ack for SCCP
Connection Confirm
message.
SCCP The SCCP connection has
CM Service Request
3G Call Setup
2. 3G-UMTS Call Flow (Originating Call)
User
Equipment
UE-RNC Sessions UTRAN RNC-Core Network Sessions Core
Network
UE RRC RNC SCCP MSC/VLR
EventStudio System Designer
06-Oct-13 07:24 (Page 2)
been established between
the RNC and the Core
Network.
Iu An Iu signaling connection is
now active between the RNC
and the Core Network.
Core Network decides that the terminal needs to be authenticated.
ranapranap
DTAP MM Authentication Request
rrcrrc
Downlink Direct Transfer [DTAP MM Authentication Request] The Authentication Request
is carried as NAS payload in
a Downlink Direct Transfer
RRC message.
rrc rrc
Uplink Direct Transfer [DTAP MM Authentication Response] The Authentication
Response is carried as NAS
payload in a Uplink Direct
Transfer RRC message.
ranap ranap
DTAP MM Authentication Response
Authentication Procedure
ranapranap
RANAP CommonID
id : id-PermanentNAS-UE-ID (23)
IMSI is sent to the RNC.
SCTP SACK SCTP level ack for
Command ID.
Core Network sends new keys for ciphering and integrity protection.
ranapranap
Security Mode Command
UIAs,
IK,
UEAs,
CK
Core Network initiates
ciphering and integrity
Protection. The "MSC/VLR"
sends the Security Mode
Command message to RNC.
Select UIA and
UEA, generate
FRESH and start
integrity
protection
rrcrrc
RRC Security Mode Command
CN domain,
UIA,
UEA,
FRESH,
Security Capability,
MAC-I
The RNC generates the
RRC message Security
mode command. The
message includes the UE
security capability, the
ciphering capability, the UIA
and FRESH to be used and
if ciphering shall be started
also the UEA to be used.
This is the first message to
be integrity protected. It
contains the MAC-I integrity
protection "checksum".
Security Procedure
3. 3G-UMTS Call Flow (Originating Call)
User
Equipment
UE-RNC Sessions UTRAN RNC-Core Network Sessions Core
Network
UE RRC RNC SCCP Iu MSC/VLR
EventStudio System Designer
06-Oct-13 07:24 (Page 3)
UE applies
the
ciphering
keys and
also starts
integrity
protection
in the
return
direction
rrc rrc
RRC Security Mode Complete
ranap ranap
Security Mode Complete
ranapranap
DTAP MM CM Service Accept The Core Network accepts
the service request.
SCTP SACK Ack for "MM CM Service
Accept".
rrcrrc
Downlink Direct Transfer [CM Service Accept] RNC carries the CM Service
Accept as a NAS payload.
rrc rrc
Uplink Direct Transfer [DTAP CC Setup] Call Setup is received as a
NAS payload.
ranap ranap
DTAP CC Setup
.... 0001 = Numbering plan identification : ISDN /Telephony
Numbering (Rec ITU -T E.164) (0x01),
BCD Digits : 5
Call Setup request is
received from the RNC.
SCTP SACK Ack for call setup request.
ranapranap
DTAP CC Call Proceeding "Core Network" signals that
the call setup is proceeding.
SCTP SACK SCTP ack for call
proceeding.
rrcrrc
Downlink Direct Transfer[DTAP CC Call Proceeding] The call proceeding
message is wrapped in a
Downlink Direct Transfer and
sent to the UE.
RANAP RAB -Assignment
id : id -RAB -SetupOrModifyList,
id : id -RAB -SetupOrModifyItem,
id : id -Alt -RAB -Parameters
Core Network initiates a
Radio Access Bearer (RAB)
Assignment. The message
specifies the Quality of
Service parameters.
SCTP SACK Ack for RAB Assignment
received from Core Network.
rrcrrc
Radio Bearer Setup
rrc rrc
Radio Bearer Setup Complete
RAB Assignment
Call Connection Setup
4. 3G-UMTS Call Flow (Originating Call)
User
Equipment
UE-RNC Sessions UTRAN RNC-Core Network Sessions Core
Network
UE RRC RNC SCCP Iu MSC/VLR
EventStudio System Designer
06-Oct-13 07:24 (Page 4)
RB
ranap ranap
RANAP RAB -Assignment
id : id -RAB -SetupOrModifiedList (52),
id : id -RAB -SetupOrModifiedItem (51),
id : id -Ass -RAB -Parameters (90)
RNC responds to Core
Network after completing RB
Setup with the Terminal.
SCTP SACK Ack for RAB Assignment
response sent from RNC to
Core Network.
RAB The voice radio access
bearer has been
successfully created.
Ringing
called
subscriber
ranapranap
DTAP CC Alerting Ask RNC to Notify the
terminal that the subscriber
is bering rung.
SCTP SACK Ack to Alerting.
rrcrrc
Downlink Direct Transfer [DTAP CC Alerting] Alert is sent to the UE.
Received
answer from
the called
subscriber
ranapranap
DTAP CC Connect Notify the RNC that the
called subscriber has
answered.
SCTP SACK Ack for Connect.
rrcrrc
Downlink Direct Transfer[DTAP CC Connect]
rrc rrc
Uplink Direct Transfer[DTAP CC Connect Acknowledge]
ranap ranap
DTAP CC Connect Acknowledge RNC responds back with
completion of connect.
SCTP SACK Ack for Connect
Acknowledge.
Voice
Path
Voice path is now active
between the User Terminal
and the Called Subscriber.
rab
Conversation
rab
Voice communication in
progress.
Conversation
5. 3G-UMTS Call Flow (Originating Call)
User
Equipment
UE-RNC Sessions UTRAN RNC-Core Network Sessions Core
Network
UE RRC RB RNC SCCP Iu RAB Voice Path MSC/VLR
EventStudio System Designer
06-Oct-13 07:24 (Page 5)
rab
Conversation
rab
rab
Conversation
rab
rab
Conversation
rab
rab
Conversation
rab
rrc rrc
Uplink Direct Transfer [DTAP CC Disconnect] Received call release from
originating subscriber
ranap ranap
DTAP CC Disconnect
.001 0000 = Cause : (16) Normal call clearing
RNC sends call disconnect
to the Core Network.
SCTP SACK SCTP ack for disconnect.
ranapranap
DTAP CC Release Core Network releases the
session.
SCTP SACK
RNC releases call
resources
ranap ranap
DTAP CC Release Complete RNC signals release
complete to Core Network
rrcrrc
Downlink Direct Transfer [DTAP CC Release Complete]
SCTP SACK The call is cleared so the Iu
connection can now be
released.
Call Connection Release
ranapranap
RANAP Iu-Release
id : id -Cause (4)
Core Network initiates the Iu
release.
SCTP SACK
Iu Connection Release
Call Release
6. 3G-UMTS Call Flow (Originating Call)
User
Equipment
UE-RNC Sessions UTRAN RNC-Core Network Sessions Core
Network
UE RRC RB RNC SCCP Iu RAB MSC/VLR
EventStudio System Designer
06-Oct-13 07:24 (Page 6)
ranap ranap
RANAP Iu-Release RNC signals back the
release of the Iu connection.
SCTP SACK
rrcrrc
RRC Connection Release
rrc rrc
RRC Connection Release Complete
RRC Connection Release
SCCP Released SCCP connection is
released as well.
SCTP SACK
SCCP Release Complete SCCP connection is now
released.
SCTP SACK
This call flow has been generated with from a Wireshark PCAP file using VisualEther (http://www.eventhelix.com/VisualEther/).
The generated call flow was later modified with EventStudio (http://www.eventhelix.com/EventStudio/) to add comments and
terminal level interactions.
Explore more call flow diagrams at: http://www.eventhelix.com/realtimemantra/telecom/