The document discusses several key aspects of an LTE access transport network:
1. It describes the five major interfaces of an eNodeB including S1, X2, OM, clock, and co-transmission interfaces.
2. It explains the protocols used on the S1 and X2 interfaces including SCTP, GTP-U, and X2AP.
3. It provides an overview of the different layers - layers 1, 2, and 3 - that can be used as transport bearer networks for an LTE system and their characteristics.
This document provides an overview of the LTE1841 Inter Frequency Load Equalization feature. It describes the motivation and goals of the feature, which are to equalize load between inter-frequency cells by maintaining the load difference between partner cells according to a configured delta. The technical details section explains the key aspects of how load is measured and exchanged between cells, how the active mode load equalization state is determined, and the process for candidate UE selection and load equalization execution.
This document discusses diagnosing LTE traffic faults through drive testing. It provides probes and indicators for issues related to insufficient resources for scheduling, coding with low values, poor coverage, abnormal receive power, and other potential problems. Diagnosis involves checking for operations and external events that could affect service rates. Specific alarms and their impacts are also listed. The document is marked as confidential information that requires permission before spreading.
The document discusses UMTS planning and dimensioning processes. It describes:
1) The overall planning process which includes system dimensioning, radio network planning, pre-launch optimization, performance monitoring, and post-launch optimization.
2) The inputs, assumptions, and steps used for air interface dimensioning which includes uplink and downlink link budget analysis to determine coverage requirements and capacity needs.
3) Traffic modelling and load calculation methods to estimate subscriber traffic per cell based on factors like subscriber density, traffic profiles, and cell area.
This document provides an overview of LTE functionalities and features. It begins with background on LTE development and standardization. It then describes the LTE network elements and interfaces, including the radio interface between UE and eNB. The document reviews the RRM framework and lists key RRM features, providing status updates on which features are ready in the current release or planned for future releases. It also includes roadmaps showing the planned features and timeline for LTE releases. The document appears to be an internal presentation on LTE technologies and the Nokia Siemens Networks product roadmap.
The document discusses various LTE measurement parameters and procedures including:
1. The eNB reports a list of detected PRACH preambles and measures timing advance, average RSSI, average SINR, UL CSI, and transport BLER for RRM purposes.
2. UE measurements include CQI, RSRP, and RSRQ while eNB measurements include timing advance, RSSI, SINR, UL CSI, detected preambles, and transport BLER. Inter-RAT measurements are also discussed.
3. Examples of RSRP, RSRQ, and timing advance procedures are provided along with CQI measurement details. PLMN selection, cell selection,
The document discusses how to characterize and dimension user traffic in 4G networks. It describes how to define data traffic in terms of data speed and data tonnage. Data speed is the rate at which data is transferred, while data tonnage refers to the total amount of data exchanged. The document provides examples of data speed metrics used in 3GPP standards and outlines factors to consider when calculating expected data usage per subscriber based on typical mobile application usage patterns and available data plans. Dimensioning user traffic accurately is important for designing 4G networks to meet capacity demands.
5G NR: Numerologies and Frame structure
Supported Transmission Numerologies
- A numerology is defined by sub-carrier spacing and Cyclic-Prefix overhead.
- In LTE there is only one subcarrier spacing which is 15kHz whereas in the case of 5G NR multiple subcarrier spacings are defined. Multiple subcarrier spacings can be derived by scaling a basic subcarrier spacing by an integer N.
- The numerology used can be selected independently of the frequency band although it is assumed not to use a very low subcarrier spacing at very high carrier frequencies. Flexible network and UE channel bandwidth are supported.
- The numerology is based on exponentially scalable sub-carrier spacing deltaF = 2µ × 15 kHz with µ = {0,1,3,4} for PSS, SSS and PBCH and µ = {0,1,2,3} for other channels.
- Normal CP is supported for all sub-carrier spacings, Extended CP is supported forµ=2.
- 12 consecutive sub-carriers form a physical resource block (PRB). Up to 275 PRBs are supported on a carrier.
- A resource defined by one subcarrier and one symbol is called as a resource element (RE).
1. The document provides Huawei's mobility strategy recommendations for Maxis' LTE network, which involves LTE, UMTS, and GSM networks.
2. The strategy addresses cell selection and reselection procedures in both idle and connected modes between the different RATs and frequencies. It aims to optimize coverage and load balancing through configuration of various priority and threshold parameters.
3. Over multiple revisions from 2012 to 2018, the strategy has been updated based on trials and discussions between Maxis and Huawei to refine the parameter settings and push more users to preferred frequencies like L2600.
This document provides an overview of the LTE1841 Inter Frequency Load Equalization feature. It describes the motivation and goals of the feature, which are to equalize load between inter-frequency cells by maintaining the load difference between partner cells according to a configured delta. The technical details section explains the key aspects of how load is measured and exchanged between cells, how the active mode load equalization state is determined, and the process for candidate UE selection and load equalization execution.
This document discusses diagnosing LTE traffic faults through drive testing. It provides probes and indicators for issues related to insufficient resources for scheduling, coding with low values, poor coverage, abnormal receive power, and other potential problems. Diagnosis involves checking for operations and external events that could affect service rates. Specific alarms and their impacts are also listed. The document is marked as confidential information that requires permission before spreading.
The document discusses UMTS planning and dimensioning processes. It describes:
1) The overall planning process which includes system dimensioning, radio network planning, pre-launch optimization, performance monitoring, and post-launch optimization.
2) The inputs, assumptions, and steps used for air interface dimensioning which includes uplink and downlink link budget analysis to determine coverage requirements and capacity needs.
3) Traffic modelling and load calculation methods to estimate subscriber traffic per cell based on factors like subscriber density, traffic profiles, and cell area.
This document provides an overview of LTE functionalities and features. It begins with background on LTE development and standardization. It then describes the LTE network elements and interfaces, including the radio interface between UE and eNB. The document reviews the RRM framework and lists key RRM features, providing status updates on which features are ready in the current release or planned for future releases. It also includes roadmaps showing the planned features and timeline for LTE releases. The document appears to be an internal presentation on LTE technologies and the Nokia Siemens Networks product roadmap.
The document discusses various LTE measurement parameters and procedures including:
1. The eNB reports a list of detected PRACH preambles and measures timing advance, average RSSI, average SINR, UL CSI, and transport BLER for RRM purposes.
2. UE measurements include CQI, RSRP, and RSRQ while eNB measurements include timing advance, RSSI, SINR, UL CSI, detected preambles, and transport BLER. Inter-RAT measurements are also discussed.
3. Examples of RSRP, RSRQ, and timing advance procedures are provided along with CQI measurement details. PLMN selection, cell selection,
The document discusses how to characterize and dimension user traffic in 4G networks. It describes how to define data traffic in terms of data speed and data tonnage. Data speed is the rate at which data is transferred, while data tonnage refers to the total amount of data exchanged. The document provides examples of data speed metrics used in 3GPP standards and outlines factors to consider when calculating expected data usage per subscriber based on typical mobile application usage patterns and available data plans. Dimensioning user traffic accurately is important for designing 4G networks to meet capacity demands.
5G NR: Numerologies and Frame structure
Supported Transmission Numerologies
- A numerology is defined by sub-carrier spacing and Cyclic-Prefix overhead.
- In LTE there is only one subcarrier spacing which is 15kHz whereas in the case of 5G NR multiple subcarrier spacings are defined. Multiple subcarrier spacings can be derived by scaling a basic subcarrier spacing by an integer N.
- The numerology used can be selected independently of the frequency band although it is assumed not to use a very low subcarrier spacing at very high carrier frequencies. Flexible network and UE channel bandwidth are supported.
- The numerology is based on exponentially scalable sub-carrier spacing deltaF = 2µ × 15 kHz with µ = {0,1,3,4} for PSS, SSS and PBCH and µ = {0,1,2,3} for other channels.
- Normal CP is supported for all sub-carrier spacings, Extended CP is supported forµ=2.
- 12 consecutive sub-carriers form a physical resource block (PRB). Up to 275 PRBs are supported on a carrier.
- A resource defined by one subcarrier and one symbol is called as a resource element (RE).
1. The document provides Huawei's mobility strategy recommendations for Maxis' LTE network, which involves LTE, UMTS, and GSM networks.
2. The strategy addresses cell selection and reselection procedures in both idle and connected modes between the different RATs and frequencies. It aims to optimize coverage and load balancing through configuration of various priority and threshold parameters.
3. Over multiple revisions from 2012 to 2018, the strategy has been updated based on trials and discussions between Maxis and Huawei to refine the parameter settings and push more users to preferred frequencies like L2600.
LTE uses various frequency bands and duplexing techniques to provide high-speed data and peak download speeds of up to 300 Mbps. It supports mobility of up to 350 km/h and uses advanced technologies like OFDM, SC-FDMA, MIMO and turbo coding to achieve low latency and high bandwidth. LTE specifications define channel bandwidths of 1.4, 3, 5, 10, 15 and 20 MHz with modulation schemes of QPSK, 16QAM and 64QAM.
Ericsson important optimization parametersPagla Knight
The document lists important optimization parameters for Ericsson including parameters related to system configuration, capacity management, directed retry, handover, HSDPA/EUL, IRAT, and idle mode selection and reselection. It provides descriptions of over 50 parameters that control aspects such as power levels, admission limits, thresholds for cell reselection, and criteria for measurements.
This document describes how using propagation delay data can help detect overshooting cells in a WCDMA network. It defines propagation delay and how it relates to distance between a UE and NodeB. The document presents a report that analyzes propagation delay counter data to identify overshooting cells and improve KPIs like accessibility and retainability. It provides examples showing how analyzing propagation delay data identified overshooting cells causing issues and helped optimize the network configuration.
This document provides a troubleshooting guide for LTE inter-radio access technology (IRAT) handovers. It describes why IRAT is needed as voice revenues remain important while data revenues grow. It also outlines the applications of IRAT, delivery policies for idle mode, connected mode, and voice services. Signaling procedures for IRAT handovers including reselection, redirection, and PS handover are defined. Key performance indicators for IRAT including control plane delays and user plane interruption times are also defined to help diagnose IRAT issues.
The document discusses various resources in an LTE network that need to be monitored to ensure capacity and quality of service. It describes several key performance indicators (KPIs) related to resources like connected users, traffic volume, paging messages, processor usage, and provides thresholds and solutions to address issues.
The document discusses the requirements and configuration of Inter Frequency Load Balancing (IFLB) in LTE networks. IFLB aims to balance traffic load across cells on different frequencies by offloading user equipment between those cells. Key steps in IFLB include determining cell load, exchanging load information, selecting offload candidates, and handing users over to target cells if their signal quality is sufficient. The document provides guidance on setting parameters that control IFLB behavior and thresholds.
Throughput calculation for LTE TDD and FDD systemsPei-Che Chang
This document discusses the calculation of throughput for LTE TDD and FDD systems. It explains that LTE systems have configurable channel bandwidth and modulation schemes, unlike fixed CDMA systems. The document then provides an example calculation of throughput for a 20 MHz bandwidth LTE FDD system using 100 resource blocks, 64QAM modulation, and 4x4 MIMO. It calculates the downlink throughput as approximately 300 Mbps and uplink as 75 Mbps after accounting for overhead. Similar calculations are shown for LTE TDD systems using different frame configurations.
This document outlines an agenda for a presentation on LTE basics and advanced topics. The presentation will cover LTE fundamentals including frame structures, reference signals, physical channels, signal processing architecture, and UE categories. It will then discuss advanced LTE topics such as MIMO modes, precoding techniques, CQI reporting, and LTE-Advanced developments. Diagrams and explanations are provided on key aspects of the LTE physical layer such as OFDMA transmission schemes, frame formats, reference signal patterns, and the transmitter and receiver processing chains.
The document discusses drive testing using TEMS Investigation software. It provides an overview of the tools needed for drive testing including a laptop, dongle, mobile set, modem, GPS, and more. It outlines the steps to setup the software and ensure all tools are connected and functioning properly. These include attaching the required devices, loading cell files, and selecting the log collection location. The document also describes some key parameters that can be analyzed during drive testing like signal strength, interference, and throughput.
The document discusses fault analysis and troubleshooting of LTE antenna and feeder systems. It describes techniques like RSSI analysis, frequency scanning, interference detection tests, and DTP testing to identify issues like passive intermodulation (PIM) and determine if the fault is in the antenna tower or below. Parameters for simulated load testing and online interference monitoring are also outlined.
This document provides parameters for radio network configuration in a Nokia wireless network. It contains over 100 parameters organized in sections for the BSC, BCF, BTS, adjacent cells, and other settings. The parameters define thresholds, timers, and options that control functions like call handling, congestion management, handover processing, and radio resource allocation. The document is intended only for Nokia customers and subject to change without notice.
This document provides definitions and descriptions for key performance indicators (KPIs) related to an eNodeB. It includes KPIs in areas such as accessibility, retainability, and mobility. The KPIs measure things like call setup success rates, call drop rates, and handover success rates. Templates are provided for standardized KPI definition. The document is intended for network planners, administrators, and operators to understand eNodeB performance.
The document discusses an LTE training course agenda presented by the OAI Project Team. It covers topics including LTE overview, channels in LTE, cell search procedure, system information, and random access procedure. For each topic, it provides outlines, descriptions, and diagrams. The random access procedure section explains its main purpose is to achieve uplink synchronization and assign a unique UE identifier C-RNTI.
The document discusses key technologies in LTE including access techniques, MIMO, scheduling, link adaptation, and HARQ. It covers OFDM and SC-FDMA used for downlink and uplink access, benefits of MIMO including improved SINR and shared SINR through modes like transmit diversity, receive diversity, and spatial multiplexing. Scheduling considers factors like CQI and aims for fairness and throughput. Link adaptation uses CQI and MCS to optimize air interface efficiency. HARQ enables recovery of errors at the MAC layer through retransmissions.
The document discusses 4G LTE drive testing. It describes the necessary equipment for drive testing including a notebook, GPS, and LTE dongle. It outlines key LTE radio parameters that are measured like PCI, RSRP, SINR, and MIMO. It also discusses measuring UE state information, throughput, and LTE access procedures including attach requests, random access failures, and E-RAB failures. Finally, it compares the impact of ANR capabilities versus UE capabilities on measuring neighboring cells within and between eNodeBs.
The document provides an overview of LTE and LTE optimization. It discusses the LTE architecture including the Evolved Packet System components like eNodeB, MME, S-GW, P-GW, HSS, and PCRF. It describes the LTE air interface including bandwidths, frequency bands, and UE capabilities. It also covers call flows, handovers, and optimization topics like network optimization processes, RF optimization objects, and troubleshooting metrics.
1. The average downlink throughput of R99 PS UL64k/DL64k service should be between 48-56 kbps.
2. The average downlink throughput of R99 PS UL64k/DL128k service needs to meet requirements.
3. Tests are conducted in areas with good radio conditions and low traffic. FTP servers are placed in the core network, and downloading uses 5 threads. Non-RAN problems and UE-related throughput declines are excluded.
The document discusses Huawei's handover algorithm II for cellular networks. It describes the different types of handovers considered in the algorithm (forced, emergency, intra-cell, inter-cell) and the procedures involved, including determining triggering conditions, selecting candidate cell lists, and performing a comprehensive decision to determine the best candidate cell. It also discusses related concepts like handover priority, penalty adjustments, and measurement report processing.
The document provides an overview of LTE physical layer specifications including OFDMA frame structure, resource block structure, protocol architecture, physical channel structure and procedures, UE measurements like RSRP and RSRQ, and key enabling technologies of LTE such as OFDM, SC-FDMA, and MIMO. It describes the LTE requirements for high peak data rates, low latency, support for high mobility users, and enhanced broadcast services.
1) The document describes key performance indicators (KPIs) for measuring the performance of an LTE radio network. It discusses KPIs related to accessibility, retainability, mobility, and latency.
2) Accessibility KPIs measure aspects like call setup success rate, RRC setup success rate, and E-RAB setup success rate. Retainability KPIs measure call drop rate and call setup completion rate. Mobility KPIs measure handover success rates within LTE and between LTE and other technologies.
3) For each KPI, the document provides a definition, calculation formula, and description of which network events and counters are needed to measure the KPI. Baseline
This document discusses the requirements for an LTE-capable transport network to deliver an optimized end-user experience. It focuses on capacity and latency. For capacity, a "single-peak, all-average" model is recommended that balances maximum capacity and economic feasibility. Latency must be low enough for applications like online gaming, with LTE offering latency around 20ms but the transport network also needing optimization to deliver that experience end-to-end. Dimensioning, aggregation, and latency guidelines are provided to help design an LTE transport network.
This document provides guidelines for LTE radio frequency (RF) network optimization. It describes the network optimization process including single site verification and RF optimization. Key aspects of RF optimization covered include preparing for optimization by collecting data, analyzing problems related to coverage, signal quality and handover success rate, and adjusting parameters like transmit power, antenna tilts and neighboring cell configurations. Common issues addressed are weak coverage, coverage holes, lack of a dominant cell, and cross coverage between cells. Optimization methods and specific cases are presented to resolve different problems.
LTE uses various frequency bands and duplexing techniques to provide high-speed data and peak download speeds of up to 300 Mbps. It supports mobility of up to 350 km/h and uses advanced technologies like OFDM, SC-FDMA, MIMO and turbo coding to achieve low latency and high bandwidth. LTE specifications define channel bandwidths of 1.4, 3, 5, 10, 15 and 20 MHz with modulation schemes of QPSK, 16QAM and 64QAM.
Ericsson important optimization parametersPagla Knight
The document lists important optimization parameters for Ericsson including parameters related to system configuration, capacity management, directed retry, handover, HSDPA/EUL, IRAT, and idle mode selection and reselection. It provides descriptions of over 50 parameters that control aspects such as power levels, admission limits, thresholds for cell reselection, and criteria for measurements.
This document describes how using propagation delay data can help detect overshooting cells in a WCDMA network. It defines propagation delay and how it relates to distance between a UE and NodeB. The document presents a report that analyzes propagation delay counter data to identify overshooting cells and improve KPIs like accessibility and retainability. It provides examples showing how analyzing propagation delay data identified overshooting cells causing issues and helped optimize the network configuration.
This document provides a troubleshooting guide for LTE inter-radio access technology (IRAT) handovers. It describes why IRAT is needed as voice revenues remain important while data revenues grow. It also outlines the applications of IRAT, delivery policies for idle mode, connected mode, and voice services. Signaling procedures for IRAT handovers including reselection, redirection, and PS handover are defined. Key performance indicators for IRAT including control plane delays and user plane interruption times are also defined to help diagnose IRAT issues.
The document discusses various resources in an LTE network that need to be monitored to ensure capacity and quality of service. It describes several key performance indicators (KPIs) related to resources like connected users, traffic volume, paging messages, processor usage, and provides thresholds and solutions to address issues.
The document discusses the requirements and configuration of Inter Frequency Load Balancing (IFLB) in LTE networks. IFLB aims to balance traffic load across cells on different frequencies by offloading user equipment between those cells. Key steps in IFLB include determining cell load, exchanging load information, selecting offload candidates, and handing users over to target cells if their signal quality is sufficient. The document provides guidance on setting parameters that control IFLB behavior and thresholds.
Throughput calculation for LTE TDD and FDD systemsPei-Che Chang
This document discusses the calculation of throughput for LTE TDD and FDD systems. It explains that LTE systems have configurable channel bandwidth and modulation schemes, unlike fixed CDMA systems. The document then provides an example calculation of throughput for a 20 MHz bandwidth LTE FDD system using 100 resource blocks, 64QAM modulation, and 4x4 MIMO. It calculates the downlink throughput as approximately 300 Mbps and uplink as 75 Mbps after accounting for overhead. Similar calculations are shown for LTE TDD systems using different frame configurations.
This document outlines an agenda for a presentation on LTE basics and advanced topics. The presentation will cover LTE fundamentals including frame structures, reference signals, physical channels, signal processing architecture, and UE categories. It will then discuss advanced LTE topics such as MIMO modes, precoding techniques, CQI reporting, and LTE-Advanced developments. Diagrams and explanations are provided on key aspects of the LTE physical layer such as OFDMA transmission schemes, frame formats, reference signal patterns, and the transmitter and receiver processing chains.
The document discusses drive testing using TEMS Investigation software. It provides an overview of the tools needed for drive testing including a laptop, dongle, mobile set, modem, GPS, and more. It outlines the steps to setup the software and ensure all tools are connected and functioning properly. These include attaching the required devices, loading cell files, and selecting the log collection location. The document also describes some key parameters that can be analyzed during drive testing like signal strength, interference, and throughput.
The document discusses fault analysis and troubleshooting of LTE antenna and feeder systems. It describes techniques like RSSI analysis, frequency scanning, interference detection tests, and DTP testing to identify issues like passive intermodulation (PIM) and determine if the fault is in the antenna tower or below. Parameters for simulated load testing and online interference monitoring are also outlined.
This document provides parameters for radio network configuration in a Nokia wireless network. It contains over 100 parameters organized in sections for the BSC, BCF, BTS, adjacent cells, and other settings. The parameters define thresholds, timers, and options that control functions like call handling, congestion management, handover processing, and radio resource allocation. The document is intended only for Nokia customers and subject to change without notice.
This document provides definitions and descriptions for key performance indicators (KPIs) related to an eNodeB. It includes KPIs in areas such as accessibility, retainability, and mobility. The KPIs measure things like call setup success rates, call drop rates, and handover success rates. Templates are provided for standardized KPI definition. The document is intended for network planners, administrators, and operators to understand eNodeB performance.
The document discusses an LTE training course agenda presented by the OAI Project Team. It covers topics including LTE overview, channels in LTE, cell search procedure, system information, and random access procedure. For each topic, it provides outlines, descriptions, and diagrams. The random access procedure section explains its main purpose is to achieve uplink synchronization and assign a unique UE identifier C-RNTI.
The document discusses key technologies in LTE including access techniques, MIMO, scheduling, link adaptation, and HARQ. It covers OFDM and SC-FDMA used for downlink and uplink access, benefits of MIMO including improved SINR and shared SINR through modes like transmit diversity, receive diversity, and spatial multiplexing. Scheduling considers factors like CQI and aims for fairness and throughput. Link adaptation uses CQI and MCS to optimize air interface efficiency. HARQ enables recovery of errors at the MAC layer through retransmissions.
The document discusses 4G LTE drive testing. It describes the necessary equipment for drive testing including a notebook, GPS, and LTE dongle. It outlines key LTE radio parameters that are measured like PCI, RSRP, SINR, and MIMO. It also discusses measuring UE state information, throughput, and LTE access procedures including attach requests, random access failures, and E-RAB failures. Finally, it compares the impact of ANR capabilities versus UE capabilities on measuring neighboring cells within and between eNodeBs.
The document provides an overview of LTE and LTE optimization. It discusses the LTE architecture including the Evolved Packet System components like eNodeB, MME, S-GW, P-GW, HSS, and PCRF. It describes the LTE air interface including bandwidths, frequency bands, and UE capabilities. It also covers call flows, handovers, and optimization topics like network optimization processes, RF optimization objects, and troubleshooting metrics.
1. The average downlink throughput of R99 PS UL64k/DL64k service should be between 48-56 kbps.
2. The average downlink throughput of R99 PS UL64k/DL128k service needs to meet requirements.
3. Tests are conducted in areas with good radio conditions and low traffic. FTP servers are placed in the core network, and downloading uses 5 threads. Non-RAN problems and UE-related throughput declines are excluded.
The document discusses Huawei's handover algorithm II for cellular networks. It describes the different types of handovers considered in the algorithm (forced, emergency, intra-cell, inter-cell) and the procedures involved, including determining triggering conditions, selecting candidate cell lists, and performing a comprehensive decision to determine the best candidate cell. It also discusses related concepts like handover priority, penalty adjustments, and measurement report processing.
The document provides an overview of LTE physical layer specifications including OFDMA frame structure, resource block structure, protocol architecture, physical channel structure and procedures, UE measurements like RSRP and RSRQ, and key enabling technologies of LTE such as OFDM, SC-FDMA, and MIMO. It describes the LTE requirements for high peak data rates, low latency, support for high mobility users, and enhanced broadcast services.
1) The document describes key performance indicators (KPIs) for measuring the performance of an LTE radio network. It discusses KPIs related to accessibility, retainability, mobility, and latency.
2) Accessibility KPIs measure aspects like call setup success rate, RRC setup success rate, and E-RAB setup success rate. Retainability KPIs measure call drop rate and call setup completion rate. Mobility KPIs measure handover success rates within LTE and between LTE and other technologies.
3) For each KPI, the document provides a definition, calculation formula, and description of which network events and counters are needed to measure the KPI. Baseline
This document discusses the requirements for an LTE-capable transport network to deliver an optimized end-user experience. It focuses on capacity and latency. For capacity, a "single-peak, all-average" model is recommended that balances maximum capacity and economic feasibility. Latency must be low enough for applications like online gaming, with LTE offering latency around 20ms but the transport network also needing optimization to deliver that experience end-to-end. Dimensioning, aggregation, and latency guidelines are provided to help design an LTE transport network.
This document provides guidelines for LTE radio frequency (RF) network optimization. It describes the network optimization process including single site verification and RF optimization. Key aspects of RF optimization covered include preparing for optimization by collecting data, analyzing problems related to coverage, signal quality and handover success rate, and adjusting parameters like transmit power, antenna tilts and neighboring cell configurations. Common issues addressed are weak coverage, coverage holes, lack of a dominant cell, and cross coverage between cells. Optimization methods and specific cases are presented to resolve different problems.
The document discusses several topics related to LTE cell planning including:
1. The general LTE cell planning process includes information collection, pre-planning, detailed planning, and cell planning which focuses on frequency, tracking area (TA), physical cell ID (PCI), and physical random access channel (PRACH) planning.
2. There are several new frequency bands for LTE including 700MHz, AWS, 2.6GHz, and reusing existing GSM bands.
3. Topics like interference coordination (ICIC), TA planning to reduce signaling, PCI planning requirements, cyclic prefix impact on symbol energy, and PRACH parameters and configurations are covered.
This document provides quality guidelines and recommendations for Samsung's Small Cell Field Test (SCFT) process. It outlines objectives to ensure accurate SCFT validation and improve quality. Guidelines are provided for circles, central SCFT optimizers, and the WCC2 quality assurance team. Key points addressed include throughput thresholds, handling of KPI failures, drive route guidelines, escalation processes, and responsibilities of various roles. The overall goal is to minimize errors and re-drives to accelerate the WCC approval process.
The document compares WiMAX and LTE TDD standards and networks. It discusses their technical differences such as standard, network structure, duplex mode, radio frame structure, access technology, and mobility. It also compares their core network configurations and provides examples of how services like VoIP and VPNs can be supported on WiMAX and LTE TDD networks. The document aims to explain the evolution from WiMAX to LTE TDD networks and some of the impacts this transition would have on terminals, network operations and maintenance, and charging.
The document describes the GPRS Tunnelling Protocol (GTP) used in 2G and 3G mobile networks. It discusses GTP interfaces and tunnels, message formats including the GTP header, and message groups. The key points are:
1. GTP is used between GPRS Support Nodes (GSNs) and between SGSN and RNC to tunnel user data packets and control signaling messages.
2. The GTP header contains fields for version, message type, length, TEID, and optional fields for sequence number and N-PDU number.
3. GTP messages are grouped into path management messages for path verification, tunnel management messages for context creation/deletion, and location/mobility management messages
Paging is the mechanism by which the network notifies a UE that it has data to send. The UE periodically wakes from idle mode to check for paging messages. If the UE ID in the paging message matches the UE, it notifies upper layers which may initiate a connection for incoming calls or other data. Paging messages are sent by the MME to eNodeBs and contain UE IDs, domain information, and indications for system information changes or emergency notifications.
Huawei hss9860 v900 r008c20 production descriptionRabih Kanaan,PMP
Huawei HSS9860 stores and manages identities, authentication data, subscription information, and location information about subscribers. In addition, the HSS9860 verifies mobile terminals when mobile terminals attempt to connect to networks.
The HSS9860 implements the following functions:
Home location register (HLR) in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS) networks
Equipment identity register (EIR) in GSM, UMTS, and EPS networks.
Home subscriber server (HSS) in evolved packet system (EPS) networks
HSS, subscription locator function (SLF), E.164 number to URI mapping (ENUM), or domain name server(DNS) in IP multimedia subsystems (IMS).
GSM, UMTS, EPS, and IMS networks are 3GPP access networks while CDMA, WLAN, WiMax, and ADSL are non-3GPP access networks.
4G-LTE Paging is made simple and easy. How is paging handled in NAS, RRC and Physical layer. With DRX cycle, how will UE NOT miss any paging and synchronised? How to implement paging in RRC?
VoLTE Service Monitoring - VoLTE Voice CallJose Gonzalez
There is currently no accepted standard for the measurement or monitoring of VoLTE Services, even though we believe that this is vital to assure the quality and reliability of such services - and to establish a framework for reliable comparison across implementations.
To this end Ascom has defined a formal definition and implementation strategy to help the Operations team solve a range of challenges, including issues related to EPC, IMS and the Application Server. We will describe this solution in a number of short articles.
This article describes the architecture of our solution and the VoLTE Voice Call test case.
The document discusses key performance indicators (KPIs) for UTRAN networks. It describes KPIs related to accessibility, retainability, mobility, traffic, and algorithms. Specific KPIs covered include call setup success rate, call drop rate, handover success rates, and counters for various network events. Measurement points and formulas for calculating each KPI are provided.
The document discusses LTE network planning procedures which involve gathering information, dimensioning capacity and coverage, and detailed planning. The key steps are:
1. Information gathering involves collecting data on subscriber usage patterns, network inventory, RF features, and coverage areas.
2. Dimensioning is divided into capacity and coverage steps. Capacity dimensioning calculates the number of sites needed based on traffic loads. Coverage dimensioning models uplink and downlink budgets to determine signal strengths and cell radii.
3. Detailed planning uses the results of dimensioning to simulate predictions and finalize parameters like transmission settings and neighbor configurations.
The document describes the IMS session flow between an originating and terminating user in an IP Multimedia Subsystem network. It involves signaling messages being passed between the user equipment and P-CSCF in the visited network, and the home network nodes of I-CSCF, S-CSCF and AS, to setup and terminate a call or session. The process includes invite, response, acknowledgement and release messaging at each stage to establish and end media connectivity between the users.
The document describes several registration and de-registration flows for IP Multimedia Subsystem (IMS). The key steps are:
1. For registration, the UE requests P-CSCF information from DHCP and DNS servers, then sends a register request to the P-CSCF which assigns a S-CSCF and retrieves the user profile from HSS.
2. Periodic re-registration follows the same process to refresh the registration.
3. For de-registration, the UE or network send a register request with expiration time of zero, removing the registration.
The document describes 4 scenarios for IMS/MMD call flows involving session establishment. Scenario 1 involves the originating UE having resources ready before sending the INVITE message, and the terminating UE having resources ready before sending the first provisional response. The call flow shows the SIP signaling messages exchanged between the UEs and IMS network entities, including an INVITE with an SDP offer from UE-1, and a 180 Ringing response from UE-2 with an SDP answer.
In this paper, we discussed about LTE system throughput calculation for both TDD and FDD system.
3GPP LTE technology support both TDD and FDD multiplexing. The paper describes all the factors which affect the throughput like Bandwidth, Modulation, UE category and mulplexing. It also describes how we get throughput 300Mbps in DL and 75Mbps in UL and what are assumptions taken to calculate the same.
Paper describes the steps and formulae to calculate the throughput for FDD system for TDD Config 1 and Config 2.
The throughput calculations shown in this paper is theoretical and limited by the assumptions taken to calculate for calculations
The document discusses the X2 interface and X2 handover procedure in LTE networks. The X2 interface connects two neighboring eNodeBs and establishes an X2 connection through the X2 setup procedure. The X2 handover procedure allows handing over a UE's connection from a source eNodeB to a target eNodeB, involving preparation where the target allocates resources and the UE connects to it, and execution including a path switch to route data to the target eNodeB. Key information like UE context and bearers is exchanged between eNodeBs through the X2 interface to enable smooth handover.
LTE (Long Term Evolution) was developed by 3GPP to improve the mobile phone standard and address future needs. It aims to improve spectral efficiency, lower costs, enhance services, utilize new spectrum, and better integrate with other standards. LTE provides peak download speeds of at least 100Mbps and upload speeds of 50Mbps with latency under 10ms. LTE Advanced was later developed to fulfill the ITU's 4G requirements of peak speeds up to 1Gbps for low mobility. The LTE architecture uses E-UTRAN on the access side and EPC on the core side. Key network elements include eNodeBs, MMEs, SGWs, and PGWs. LTE uses protocols like S
The document contains frequently asked questions about LTE (Long Term Evolution) technology. It discusses what LTE is, its goals and speeds. It also addresses LTE architecture including EUTRAN, interfaces and network elements. Additional topics covered include LTE protocols and specifications, LTE Advanced, security, VoLGA, CS Fallback and more.
This document provides an overview of the LTE radio interface architecture. It discusses:
- The evolution from WCDMA to a new LTE system architecture optimized for packet-switched services
- The key elements of the LTE architecture including the E-UTRAN, eNodeB, EPC, MME, S-GW, P-GW, and their functions
- The three deployment scenarios for the LTE architecture: with only E-UTRAN, with legacy 3GPP networks, and with non-3GPP networks
- The split of the radio protocol stack into control and user planes, and the functions of protocols like PDCP, RLC, MAC, and RRC
- The
This document contains questions and answers about LTE (Long Term Evolution) technology. Some key points covered include:
- OFDMA is used for downlink and SC-FDMA is used for uplink to overcome high PAPR issues.
- CDS dynamically schedules radio resources, modulation, coding and power control based on channel quality and traffic load.
- MIMO uses multiple antennas to increase data rates up to a maximum of 8x8 MIMO.
- The LTE network architecture includes the eNB, MME, S-GW and P-GW connected by various interfaces like S1, S6a, S5 etc.
- Security in LTE is based on
The document contains questions and answers about LTE (Long Term Evolution) technology. LTE aims to improve spectral efficiency, lower costs, and improve services compared to previous standards. It provides peak download rates of at least 100 Mbps and round-trip times of less than 10ms. While LTE is considered a 4G standard, it does not fully meet the requirements in the ITU definition. LTE Advanced, which is still being developed, aims to meet the full ITU 4G requirements including peak rates of up to 1 Gbps for low mobility. The LTE architecture consists of the E-UTRAN access network and EPC core network.
The document contains questions and answers about LTE (Long Term Evolution) technology. LTE aims to improve spectral efficiency, lower costs, and improve services compared to previous standards. It provides peak download rates of at least 100 Mbps and round-trip times of less than 10ms. While LTE is considered a 3.9G technology, LTE Advanced seeks to meet the full ITU 4G requirements including peak rates of up to 1 Gbps for low mobility. The LTE architecture consists of the E-UTRAN access network and EPC core network. Key network elements include eNodeBs, MMEs for mobility management, SGWs for routing and anchoring user data, and PGWs for external connectivity
The document discusses frequently asked questions about LTE (Long Term Evolution) technology. It covers questions about what LTE is, its goals and speeds, architecture involving components like E-UTRAN and EPC, interfaces like S1 and S5, network elements including eNB, MME and SGW, protocols and specifications, LTE advanced, circuit switched fallback, security, and other aspects of LTE networks.
I AM SUDANESE,MASTER OF TELECOM FROM SUDAN UNEVERSITY ,THIS IS MY DOCUMENT I INVESTIGATE IN LTE WITH MORE THAN 50 REFERENCE , GOD BLESS US ,PLEASE FEEL FREE TO ASK ABOUT ANY THING IN THIS TOPIC
MY EMAIL khalidaam2015@hotmail,khalidaa@sudatel.sd
دعواتكم لى وللوالدين ولاهلى , الحمد لله فبنعمته تتم الصالحات اللهم احفظ الدول الاسلامية من كل كيد واغدق عليهم الرخاء
This white paper discusses protocol signaling procedures in LTE networks, including:
1) The LTE network architecture includes eNodeBs, MMEs, SGWs, and PGWs that facilitate communication between UEs and the core network.
2) UEs access the network through random access procedures and establish default bearers for connectivity.
3) System information broadcasting allows UEs to select networks and camp on cells, while tracking area updates allow UEs to update their locations.
4) Attach procedures register UEs on the network and allocate IP addresses, while detach procedures deregister UEs when no longer requiring service.
This document provides an overview of LTE networks and technology. It discusses key aspects of LTE including peak data rates of 50-100 Mbps, reduced latency under 10ms, OFDMA for downlink and SC-FDMA for uplink, support for bandwidths from 1.4-20 MHz, and mobility support up to 350km/h. It also examines the architecture including elements such as the eNodeB, MME, S-GW, P-GW, and interfaces such as S1, X2.
The document discusses the evolution of 3G networks to LTE networks. It describes key technologies such as OFDMA, SC-FDMA, and MIMO that improve spectral efficiency and throughput. The LTE network architecture is presented, including elements such as the E-UTRAN, MME, serving gateway, PDN gateway, and HSS. The interfaces between these elements are also outlined.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document describes the design of an LTE network optimization project by a group of students from Taiz University. It includes an introduction to LTE, the network planning process, and LTE system architecture. The network planning section discusses coverage planning including link budget calculations and propagation models, as well as capacity planning considering factors like interference levels and supported modulation schemes. The document also provides an overview of LTE system architecture components including the user equipment, E-UTRAN, EPC, and functions of each. It concludes with a section on LTE radio frequency optimization methods.
1. The document discusses scalability problems in mobile wireless networks caused by increasing data usage. It introduces three categories of network architectures introduced in 3GPP Release 10 to address this - LIPA, SIPTO, and IP flow mobility.
2. LIPA allows local access to a private network through a femtocell without traversing the core network. SIPTO offloads certain traffic like best effort services to a local network to reduce core network load.
3. There are two types of breakout architectures - with the breakpoint at a private network, bypassing the core network, or at/above the radio access network, still using some core network functions. LIPA and SIPTO help increase revenue by
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VSURESHA V
This document provides an overview of Module 3 which covers the channel structure of LTE. It discusses:
1. The channel structure in LTE includes logical channels, transport channels, and physical channels. Logical channels provide services to higher layers, transport channels to lower layers, and physical channels handle actual transmission.
2. The LTE network architecture consists of the radio access network (E-UTRAN) and core network (EPC). E-UTRAN includes eNodeBs while EPC includes MME, SGW, PGW, and PCRF.
3. The radio interface protocol stack separates into control and user planes. It consists of layers like RRC, PDCP, RLC, MAC
Long Term Evolution (LTE) is a new cellular technology that provides significantly faster data speeds of up to 150 Mbps downstream and 50 Mbps upstream. LTE uses an all-IP network and aims to support new applications requiring high data rates like video calling. The document provides an overview of the LTE protocol stack and how data packets move through it. It describes the different layers including the MAC, RLC, and PDCP layers and how packets are scheduled, transmitted, acknowledged and retransmitted in the downlink and uplink directions. Key aspects like quality of service, mobility management, power saving modes are also summarized.
Long Term Evolution (LTE) is a cellular technology that provides significantly faster data speeds of up to 150 Mbps downstream and 50 Mbps upstream. This document provides an overview of the LTE protocol stack, tracing the path of a data packet through the layers from physical to medium access control to radio link control and packet data convergence protocol. Key aspects of LTE operation discussed include hybrid automatic repeat request for error correction, scheduling, quality of service controls, handovers between base stations, and power saving modes.
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels senthil krishnan
LTE is a standard for wireless broadband communication that aims to provide faster data speeds and improved system capacity. It evolved from 3G UMTS standards developed by 3GPP. The main goals of LTE are to increase data rates, improve spectral efficiency, and reduce latency. LTE introduced new network architectures using IP-based backhaul between network nodes and evolved packet core (EPC) to support packet-switched traffic with seamless mobility and quality of service. Key aspects of LTE include support for flexible bandwidths up to 20 MHz, MIMO transmission, and both Frequency Division Duplex (FDD) and Time Division Duplex (TDD) modes.
This document provides an overview of LTE basics including:
- The LTE network architecture uses a flat design with eNodeBs and an Evolved Packet Core consisting of the MME, S-GW, and P-GW.
- Key LTE technologies include OFDMA in the downlink, SC-FDMA in the uplink, and MIMO. The radio protocol stack separates user and control planes.
- LTE aims to provide high peak data rates up to 100Mbps downlink and 50Mbps uplink, low latency under 10ms, improved spectrum efficiency, and support for bandwidths up to 20MHz.
- LTE-Advanced further improves on LTE with data
This slide for your understanding on LTE !
LTE, the wireless access protocol for 4G mobile network service, has evolved from GSM and WCDMA based on 3GPP!
The contents of this slide is below;
I. LTE Introduction
II. LTE Protocol Layer
III. SAE Architecture
IV. NAS(Non Access Stratum) Protocols
V. EPC Protocol Stacks
With my regards,
Guisun Han
Similar to 4 lte access transport network dimensioning issue 1.02 (20)
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
2. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
3. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
4. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
5. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
6. The eNodeB communicates with other NEs through the following five major interfaces:
The S1 interface exists between the eNodeB and the S-GW/MME. One eNodeB
supports a maximum of 16 S1 interfaces.
The X2 interface exists between the eNodeBs. It mainly implements the X2
handover function. One eNodeB supports a maximum of 32 X2 interfaces.
The OM interface, also known as the OM channel, exists between the eNodeB and
the network management system.
The clock interface, also known as the clock channel, exists between the eNodeB
and the IP clock server. The eNodeB, functioning as the clock client, obtains the
system clock from the clock packets that are periodically sent from the IP clock
server.
The co-transmission interface, also called co-transmission channel, exists between
the eNodeB and other devices. Traffic of other devices is forwarded through the IP
routing function of the eNodeB. The other device can be a
GSM/CDMA/WiMAX/UMTS/LTE base station or an IP-based device.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
7. The S1 interface can be subdivided into the S1-MME interface supporting Control Plane
signaling between the eNodeB and the MME and the S1-U Interface supporting User Plane
traffic between the eNodeB and the S-GW.
S1 application protocol supports following functions
E-RAB Management - this incorporates the setting up, modifying and releasing of
the E-RABs by the MME.
Initial Context Transfer - this is used to establish an S1UE context in the eNodeB,
setup the default IP connectivity and transfer NAS related signaling.
UE Capability Information Indication - this is used to inform the MME of the UE
Capability Information.
Mobility - this incorporates mobility features to support a change in eNodeB or
change in RAT.
Paging
S1 Interface Management - this incorporates a number of sub functions dealing
with resets, load balancing and system setup etc.
NAS Signaling Transport - this is used for the transport of NAS related signaling
over the S1-MME Interface.
UE Context Modification and Release - this allows for the modification and release
of the established UE Context in the eNodeB and MME respectively.
Location Reporting - this enables the MME to be made aware of the UEs current
location within the network.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
8. Defined by the IETF (Internet Engineering Task Force) rather than the 3GPP, SCTP was
developed to overcome the shortfalls in TCP (Transmission Control Protocol) and UDP
when transferring signaling information over an IP bearer. Functions provided by SCTP
include:
Reliable delivery of higher layer payloads.
Sequential delivery of higher layer payloads.
Flow control.
GTP-U tunnels are used to carry encapsulated PDU (Protocol Data Unit) and signaling
messages between endpoints. Numerous GTP-U tunnels may exist in order to differentiate
between EPS bearer contexts and these are identified through a TEID (Tunnel Endpoint
Identifier).
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
9. X2 interface interconnects two eNodeBs and in so doing supports both a control plane and
user plane. The principle control plane protocol is X2AP . This resides on SCTP where as
the User Plane IP is transferred using the services of GTP-U and UDP .
The function of X2 AP is shown as following:
Mobility Management - this enables the serving eNodeB to move the responsibility
of a specified UE to a target eNodeB. This includes Forwarding the User Plane,
Status Transfer and UE Context Release functions.
Load Management - this function enables eNodeBs to communicate with each
other in order to report resource status, overload indications and current traffic
loading.
Error Reporting - this allows for the reporting of general error situations for which
specific error reporting mechanism have not been defined.
Setting / Resetting X2 - this provides a means by which the X2 interface can be
setup / reset by exchanging the necessary information between the eNodeBs.
Configuration Update - this allows the updating of application level data which is
needed for two eNodeBs to interoperate over the X2 interface.
For the SCTP and GTP, it performs the similar functions as it performs in S1 interface.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
10. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
11. IEEE1588 defines the PTP protocol, which applies to the standard Ethernet, with the
precision to microseconds.IEEE1588 V2 released in 2008 mainly incorporates the
improvements on higher frequency accuracy and less impact of the processing delay at the
intermediate transport equipment.
The IEEE1588 standard targets precise synchronization of distributed and independent
clocks in measurement and control systems. In LTE applications, high-accuracy frequency
synchronization and time synchronization between clock servers and eNodeBs can be
achieved.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
12. When layer 1 network is adopted as the transport bearer network, the eNodeB and
adjacent NEs are connected through the physical layer. The Synchronous Digital Hierarchy
(SDH) network and Plesiochronous Digital Hierarchy (PDH) network are typical layer 1
networks. The eNodeB supports the access to the SDH/PDH network through the E1/T1
interface. The direct connection through the Ethernet interface, for example, the
connection of the eNodeB and the S-GW through the GE optical cable is a layer 1 network.
The following describes only the E1/T1 connection mode, because the direct connection
mode is rare in the actual situations.
As shown above, the layer 1 network provides only the bearer function on the physical
layer, which is the simplest transport bearer mode. In this mode, the transmission to the
upper layers is transparent. When using a layer 1 networking solution, users need to
configure the related data concerning the physical layer, such as the attributes of the E1/T1
interface.
The cost of renting the transport devices is usually high. In the case of the layer 1 network,
the channels are allocated in fixed mode. Therefore, the bandwidth utilization is low.
Besides, the bandwidth needs to be configured for each S1/X2 logical interface.
The layer 1 transport bearer network is usually applied to the GSM/UMTS system that
provides mainly the CS service. It is rarely applied to the LTE system that provides mainly
the PS service.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
13. The layer 2 network is usually adopted as the transport bearer network of the LTE system.
The layer 2 network in the LTE system is the Ethernet switching network. The major device
is the Ethernet switch. The eNodeB accesses the Ethernet switching network through the
FE/GE interface.
As shown above, the layer 2 network provides the bearer function on the MAC layer. The
MAC layer is the data link layer protocol of the Ethernet. Complying with the IEEE 802.3,
the MAC layer provides addressing and data access control mechanisms.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
14. The layer 3 network in the LTE system is the IP routing network. The major device is the
router. The eNodeB accesses the IP routing network through the FE/GE interface or the
E1/T1 interface.
As shown above, the layer 3 network provides the bearer function on the IP layer. Users
need to configure the physical layer, data link layer, and IP layer.
The configuration of the physical layer and data link layer involves the configuration of the
E1/T1 interface and FE/GE interface.
The configuration of the IP layer involves the configuration of the IP addresses, IP route list,
and DiffServ.
The layer 3 network is usually adopted as the transport bearer network of the LTE system.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
15. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
16. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
17. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
18. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
19. MAC provides the interface between the E-UTRA protocols and the E-UTRA Physical Layer.
In doing this it provides the following services:
Mapping - MAC maps the information received on the LTE Logical Channels into
the LTE transport channels.
Multiplexing - The information provided to MAC will come from a RB (Radio Bearer)
or multiple Radio Bearers. The MAC layer is able to multiplex different bearers into
the same TB (Transport Block), thus increasing efficiency.
HARQ (Hybrid Automatic Repeat Request) - MAC utilizes HARQ to provide error
correction services across the air. HARQ is a feature which requires the MAC and
Physical Layers to work closely together.
Radio Resource Allocation - QoS (Quality of Service) based scheduling of traffic and
signaling to users is provided by MAC.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
20. The RLC protocol exists in the UE and the eNodeB. As its name suggests it provides “radio
link” control, if required. In essence, RLC supports three delivery services to the higher
layers:
TM (Transparent Mode) - This is utilized for some of the air interface channels, e.g.
broadcast and paging. It provides a connectionless service for signaling.
UM (Unacknowledged Mode) - This is like Transparent Mode, in that it is a
connectionless service; however it has the additional features of sequencing,
segmentation and concatenation.
AM (Acknowledged Mode) - This offers an ARQ (Automatic Repeat Request)
service. As such, retransmissions can be used.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
21. PDCP (Packet Data Convergence Protocol) provides services to both the Control Plane and
User Plane. The main PDCP functions include:
Header compression and decompression of IP datagrams using the ROHC (Robust
Header Compression) protocol.
Maintenance of PDCP SN (Sequence Number) for radio bearers operating in RLC
AM (Acknowledged Mode).
In-sequence delivery of upper layer PDU (Protocol Data Units) at handover.
Duplicate elimination of lower layer SDUs at handover for RLC AM radio bearers.
Ciphering and deciphering of User and Control Plane data.
Integrity protection and integrity verification of the Control Plane data.
Discarding of data on a timeout basis.
Discarding of data on a duplicate basis.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
22. In radio systems, the resources on the LTE-Uu interface are far more precious than the
processing capability of processors. Therefore, ROHC is suitable for radio systems, even
though it is complex compared with earlier schemes. It is mainly used for VoIP services.
In LTE, the ROHC entity is located within the Packet Data Convergence Protocol (PDCP)
entity on the user planes of the UE and the eNodeB, and is used only for the header
compression and decompression of data packets on the user plane.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
23. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
24. GTP-U tunnels are used to carry encapsulated PDU (Protocol Data Unit) between endpoints
or in the case of the X2 interface.
Numerous GTP-U tunnels may exist in order to differentiate between EPS bearer contexts
and these are identified through a TEID (Tunnel Endpoint Identifier).
The average header for GTP-U is 12 bytes, consist of following part
Version: Specify the GTP protocol version
P flag: Indicate whether another GTPv2-C message with its own header and body
shall be present at the end of the current message
T flag: Indicate the presence or not of the TEID field.
Message Type: Indicate the type of GTP message.
TEID: Indicate the unique GTP channel. It is unique per EPS bearer for GTP-U and
per PDN connection for GTP-C.
Sequence Number: Allows in-order delivery of user plane PDU.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
25. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
26. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
27. Access control based on IEEE 802.1x ensure the authorized accesses of the eNodeB to the
transport network. For details, see section 5.2 "Access Control Based on IEEE 802.1x." To
adapt to the all-IP based transmission mode of the LTE system, the eNodeB uses the IPSec
security mechanism to ensure the confidentiality, integrity, and availability of data
transmission. IPSec services are the security services provided for the IP layer, and thus can
be used by the upper-layer protocols such as the TCP, UDP, ICMP, and SCTP. IPSec is a
protocol family used to guarantee the security for IP communication.
For transmission of IP packets, IPSec guarantees high-quality and interoperable security
based on cryptology. Ciphering and integrity verification are performed on the IP layer
between specific communicating parties to guarantee the following security features of
packet transmission:
Data confidentiality: Ciphering protection is performed on user data, which is
transmitted in ciphered text.
Data integrity: The received data is authenticated to check whether or not the data
is modified.
Authentication: The data source is authenticated to guarantee that data is
transmitted from an authenticated sender.
Replay protection: The attack by unauthorized users, who repeatedly transmit the
captured packets, is prevented. The party under the attack does not accept the old
or repeated packets.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
28. IPSec supports two security protocols: the Authentication Header (AH) protocol and
Encapsulation Security Protocol (ESP) protocol. The AH protocol performs integrity
protection, and the ESP protocol performs both integrity protection and ciphering.
IPSec supports two packet encapsulation modes: transport mode and tunnel mode. The
difference between the transport mode and the tunnel mode is the IP packet protection
scope.
Transport mode: protects the effective payload and upper-layer protocols (ULPs) of
IP packets. In transport mode, the IPSec headers (AH or ESP) are placed behind the
IP header and before the ULPs.
Tunnel mode: protects the security for original IP packets. In tunnel mode, the
original IP packet is encapsulated into a new IP packet, and the IPSec header is
inserted between the headers (AH and/or ESP) of the new and original IP packets.
The header of the original IP packet is protected as part of the effective payload.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
29. Virtual Local Area Network (VLAN) is a data exchange technology derived from the
traditional LAN.
VLAN allows LAN devices to be logically grouped into multiple network segments (that is,
smaller LANs) to implement virtual workgroups. The hosts in different VLANs are separated
from each other and they communicate with each other only through routers. A VLAN is a
broadcast domain, that is, a host in a VLAN can receive the broadcast packets from the
other hosts in the same VLAN but cannot receive the broadcast packets from other VLANs.
The VLAN attaches different labels to the operation, administration, and maintenance
(OAM) data and the traffic data. Thus, differentiated services can be provided. The VLAN
also provides services of different priorities and security levels on the MAC layer.
The VLAN header consists of following parts:
TPID: Tag protocol identifier, indicate that it is the frame with 802.1Q, the value is
fixed with 0x8100, the length is 2 bytes
PRI: Priority indicator, 3 bits
CFI: Canonical Format Indicator, 1 bit
VLAN ID: Indicate which VLAN belongs to, 12 bits
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
30. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
31. LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
32. From the capacity dimensioning, we can get throughput of radio interface, including the
overhead of radio interface. So the radio payload throughput can be calculated. During the
IP transport, the additional overhead will be added, from the analysis of overhead, we can
get the throughput of transport layer.
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
33. PDCP: Packet Data Convergence Protocol, perform data integrity check and ciphering
function.
ROHC: Robust of head compression, it is a kind of head compression technology
RLC: Radio link control protocol
MAC: Perform scheduling control function
CRC: Cyclic redundancy check
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
34. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
35. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
36. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
37. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
38. The LMPT provides four Ethernet interfaces, that is, two optical interfaces (SFP,
100/1000BASE-FX) and two electrical interfaces (RJ45, 10/100/1000BASE-TX). Two
interfaces can be used in combined mode. Multi-mode optical cable or single-mode optical
cable can be used according to the type of the optical module.
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
39. LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission