SlideShare a Scribd company logo
 1.01朱殿荣修订。根据郭宁反馈修订部分英文表述bug;将文中eNB全部更换为eNodeB;
修订文中部分图片不对其问题guo
 1.02朱殿荣修订。郭宁:
 p10,ip client 改为clock。
 胶片中多处RLP,是否改为RLC?
 另外,overhead这个词,名词解释有包头的意思吗?
 是否应该是header。。。或者用overall header????
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The eNodeB communicates with other NEs through the following five major interfaces:
 The S1 interface exists between the eNodeB and the S-GW/MME. One eNodeB
supports a maximum of 16 S1 interfaces.
 The X2 interface exists between the eNodeBs. It mainly implements the X2
handover function. One eNodeB supports a maximum of 32 X2 interfaces.
 The OM interface, also known as the OM channel, exists between the eNodeB and
the network management system.
 The clock interface, also known as the clock channel, exists between the eNodeB
and the IP clock server. The eNodeB, functioning as the clock client, obtains the
system clock from the clock packets that are periodically sent from the IP clock
server.
 The co-transmission interface, also called co-transmission channel, exists between
the eNodeB and other devices. Traffic of other devices is forwarded through the IP
routing function of the eNodeB. The other device can be a
GSM/CDMA/WiMAX/UMTS/LTE base station or an IP-based device.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The S1 interface can be subdivided into the S1-MME interface supporting Control Plane
signaling between the eNodeB and the MME and the S1-U Interface supporting User Plane
traffic between the eNodeB and the S-GW.
 S1 application protocol supports following functions
 E-RAB Management - this incorporates the setting up, modifying and releasing of
the E-RABs by the MME.
 Initial Context Transfer - this is used to establish an S1UE context in the eNodeB,
setup the default IP connectivity and transfer NAS related signaling.
 UE Capability Information Indication - this is used to inform the MME of the UE
Capability Information.
 Mobility - this incorporates mobility features to support a change in eNodeB or
change in RAT.
 Paging
 S1 Interface Management - this incorporates a number of sub functions dealing
with resets, load balancing and system setup etc.
 NAS Signaling Transport - this is used for the transport of NAS related signaling
over the S1-MME Interface.
 UE Context Modification and Release - this allows for the modification and release
of the established UE Context in the eNodeB and MME respectively.
 Location Reporting - this enables the MME to be made aware of the UEs current
location within the network.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 Defined by the IETF (Internet Engineering Task Force) rather than the 3GPP, SCTP was
developed to overcome the shortfalls in TCP (Transmission Control Protocol) and UDP
when transferring signaling information over an IP bearer. Functions provided by SCTP
include:
 Reliable delivery of higher layer payloads.
 Sequential delivery of higher layer payloads.
 Flow control.
 GTP-U tunnels are used to carry encapsulated PDU (Protocol Data Unit) and signaling
messages between endpoints. Numerous GTP-U tunnels may exist in order to differentiate
between EPS bearer contexts and these are identified through a TEID (Tunnel Endpoint
Identifier).
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 X2 interface interconnects two eNodeBs and in so doing supports both a control plane and
user plane. The principle control plane protocol is X2AP . This resides on SCTP where as
the User Plane IP is transferred using the services of GTP-U and UDP .
 The function of X2 AP is shown as following:
 Mobility Management - this enables the serving eNodeB to move the responsibility
of a specified UE to a target eNodeB. This includes Forwarding the User Plane,
Status Transfer and UE Context Release functions.
 Load Management - this function enables eNodeBs to communicate with each
other in order to report resource status, overload indications and current traffic
loading.
 Error Reporting - this allows for the reporting of general error situations for which
specific error reporting mechanism have not been defined.
 Setting / Resetting X2 - this provides a means by which the X2 interface can be
setup / reset by exchanging the necessary information between the eNodeBs.
 Configuration Update - this allows the updating of application level data which is
needed for two eNodeBs to interoperate over the X2 interface.
 For the SCTP and GTP, it performs the similar functions as it performs in S1 interface.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 IEEE1588 defines the PTP protocol, which applies to the standard Ethernet, with the
precision to microseconds.IEEE1588 V2 released in 2008 mainly incorporates the
improvements on higher frequency accuracy and less impact of the processing delay at the
intermediate transport equipment.
 The IEEE1588 standard targets precise synchronization of distributed and independent
clocks in measurement and control systems. In LTE applications, high-accuracy frequency
synchronization and time synchronization between clock servers and eNodeBs can be
achieved.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 When layer 1 network is adopted as the transport bearer network, the eNodeB and
adjacent NEs are connected through the physical layer. The Synchronous Digital Hierarchy
(SDH) network and Plesiochronous Digital Hierarchy (PDH) network are typical layer 1
networks. The eNodeB supports the access to the SDH/PDH network through the E1/T1
interface. The direct connection through the Ethernet interface, for example, the
connection of the eNodeB and the S-GW through the GE optical cable is a layer 1 network.
The following describes only the E1/T1 connection mode, because the direct connection
mode is rare in the actual situations.
 As shown above, the layer 1 network provides only the bearer function on the physical
layer, which is the simplest transport bearer mode. In this mode, the transmission to the
upper layers is transparent. When using a layer 1 networking solution, users need to
configure the related data concerning the physical layer, such as the attributes of the E1/T1
interface.
 The cost of renting the transport devices is usually high. In the case of the layer 1 network,
the channels are allocated in fixed mode. Therefore, the bandwidth utilization is low.
Besides, the bandwidth needs to be configured for each S1/X2 logical interface.
 The layer 1 transport bearer network is usually applied to the GSM/UMTS system that
provides mainly the CS service. It is rarely applied to the LTE system that provides mainly
the PS service.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The layer 2 network is usually adopted as the transport bearer network of the LTE system.
The layer 2 network in the LTE system is the Ethernet switching network. The major device
is the Ethernet switch. The eNodeB accesses the Ethernet switching network through the
FE/GE interface.
 As shown above, the layer 2 network provides the bearer function on the MAC layer. The
MAC layer is the data link layer protocol of the Ethernet. Complying with the IEEE 802.3,
the MAC layer provides addressing and data access control mechanisms.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The layer 3 network in the LTE system is the IP routing network. The major device is the
router. The eNodeB accesses the IP routing network through the FE/GE interface or the
E1/T1 interface.
 As shown above, the layer 3 network provides the bearer function on the IP layer. Users
need to configure the physical layer, data link layer, and IP layer.
 The configuration of the physical layer and data link layer involves the configuration of the
E1/T1 interface and FE/GE interface.
 The configuration of the IP layer involves the configuration of the IP addresses, IP route list,
and DiffServ.
 The layer 3 network is usually adopted as the transport bearer network of the LTE system.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 MAC provides the interface between the E-UTRA protocols and the E-UTRA Physical Layer.
In doing this it provides the following services:
 Mapping - MAC maps the information received on the LTE Logical Channels into
the LTE transport channels.
 Multiplexing - The information provided to MAC will come from a RB (Radio Bearer)
or multiple Radio Bearers. The MAC layer is able to multiplex different bearers into
the same TB (Transport Block), thus increasing efficiency.
 HARQ (Hybrid Automatic Repeat Request) - MAC utilizes HARQ to provide error
correction services across the air. HARQ is a feature which requires the MAC and
Physical Layers to work closely together.
 Radio Resource Allocation - QoS (Quality of Service) based scheduling of traffic and
signaling to users is provided by MAC.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The RLC protocol exists in the UE and the eNodeB. As its name suggests it provides “radio
link” control, if required. In essence, RLC supports three delivery services to the higher
layers:
 TM (Transparent Mode) - This is utilized for some of the air interface channels, e.g.
broadcast and paging. It provides a connectionless service for signaling.
 UM (Unacknowledged Mode) - This is like Transparent Mode, in that it is a
connectionless service; however it has the additional features of sequencing,
segmentation and concatenation.
 AM (Acknowledged Mode) - This offers an ARQ (Automatic Repeat Request)
service. As such, retransmissions can be used.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 PDCP (Packet Data Convergence Protocol) provides services to both the Control Plane and
User Plane. The main PDCP functions include:
 Header compression and decompression of IP datagrams using the ROHC (Robust
Header Compression) protocol.
 Maintenance of PDCP SN (Sequence Number) for radio bearers operating in RLC
AM (Acknowledged Mode).
 In-sequence delivery of upper layer PDU (Protocol Data Units) at handover.
 Duplicate elimination of lower layer SDUs at handover for RLC AM radio bearers.
 Ciphering and deciphering of User and Control Plane data.
 Integrity protection and integrity verification of the Control Plane data.
 Discarding of data on a timeout basis.
 Discarding of data on a duplicate basis.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 In radio systems, the resources on the LTE-Uu interface are far more precious than the
processing capability of processors. Therefore, ROHC is suitable for radio systems, even
though it is complex compared with earlier schemes. It is mainly used for VoIP services.
 In LTE, the ROHC entity is located within the Packet Data Convergence Protocol (PDCP)
entity on the user planes of the UE and the eNodeB, and is used only for the header
compression and decompression of data packets on the user plane.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 GTP-U tunnels are used to carry encapsulated PDU (Protocol Data Unit) between endpoints
or in the case of the X2 interface.
 Numerous GTP-U tunnels may exist in order to differentiate between EPS bearer contexts
and these are identified through a TEID (Tunnel Endpoint Identifier).
 The average header for GTP-U is 12 bytes, consist of following part
 Version: Specify the GTP protocol version
 P flag: Indicate whether another GTPv2-C message with its own header and body
shall be present at the end of the current message
 T flag: Indicate the presence or not of the TEID field.
 Message Type: Indicate the type of GTP message.
 TEID: Indicate the unique GTP channel. It is unique per EPS bearer for GTP-U and
per PDN connection for GTP-C.
 Sequence Number: Allows in-order delivery of user plane PDU.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 Access control based on IEEE 802.1x ensure the authorized accesses of the eNodeB to the
transport network. For details, see section ‎5.2 "Access Control Based on IEEE 802.1x." To
adapt to the all-IP based transmission mode of the LTE system, the eNodeB uses the IPSec
security mechanism to ensure the confidentiality, integrity, and availability of data
transmission. IPSec services are the security services provided for the IP layer, and thus can
be used by the upper-layer protocols such as the TCP, UDP, ICMP, and SCTP. IPSec is a
protocol family used to guarantee the security for IP communication.
 For transmission of IP packets, IPSec guarantees high-quality and interoperable security
based on cryptology. Ciphering and integrity verification are performed on the IP layer
between specific communicating parties to guarantee the following security features of
packet transmission:
 Data confidentiality: Ciphering protection is performed on user data, which is
transmitted in ciphered text.
 Data integrity: The received data is authenticated to check whether or not the data
is modified.
 Authentication: The data source is authenticated to guarantee that data is
transmitted from an authenticated sender.
 Replay protection: The attack by unauthorized users, who repeatedly transmit the
captured packets, is prevented. The party under the attack does not accept the old
or repeated packets.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 IPSec supports two security protocols: the Authentication Header (AH) protocol and
Encapsulation Security Protocol (ESP) protocol. The AH protocol performs integrity
protection, and the ESP protocol performs both integrity protection and ciphering.
 IPSec supports two packet encapsulation modes: transport mode and tunnel mode. The
difference between the transport mode and the tunnel mode is the IP packet protection
scope.
 Transport mode: protects the effective payload and upper-layer protocols (ULPs) of
IP packets. In transport mode, the IPSec headers (AH or ESP) are placed behind the
IP header and before the ULPs.
 Tunnel mode: protects the security for original IP packets. In tunnel mode, the
original IP packet is encapsulated into a new IP packet, and the IPSec header is
inserted between the headers (AH and/or ESP) of the new and original IP packets.
The header of the original IP packet is protected as part of the effective payload.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 Virtual Local Area Network (VLAN) is a data exchange technology derived from the
traditional LAN.
 VLAN allows LAN devices to be logically grouped into multiple network segments (that is,
smaller LANs) to implement virtual workgroups. The hosts in different VLANs are separated
from each other and they communicate with each other only through routers. A VLAN is a
broadcast domain, that is, a host in a VLAN can receive the broadcast packets from the
other hosts in the same VLAN but cannot receive the broadcast packets from other VLANs.
The VLAN attaches different labels to the operation, administration, and maintenance
(OAM) data and the traffic data. Thus, differentiated services can be provided. The VLAN
also provides services of different priorities and security levels on the MAC layer.
 The VLAN header consists of following parts:
 TPID: Tag protocol identifier, indicate that it is the frame with 802.1Q, the value is
fixed with 0x8100, the length is 2 bytes
 PRI: Priority indicator, 3 bits
 CFI: Canonical Format Indicator, 1 bit
 VLAN ID: Indicate which VLAN belongs to, 12 bits
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 From the capacity dimensioning, we can get throughput of radio interface, including the
overhead of radio interface. So the radio payload throughput can be calculated. During the
IP transport, the additional overhead will be added, from the analysis of overhead, we can
get the throughput of transport layer.
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 PDCP: Packet Data Convergence Protocol, perform data integrity check and ciphering
function.
 ROHC: Robust of head compression, it is a kind of head compression technology
 RLC: Radio link control protocol
 MAC: Perform scheduling control function
 CRC: Cyclic redundancy check
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The LMPT provides four Ethernet interfaces, that is, two optical interfaces (SFP,
100/1000BASE-FX) and two electrical interfaces (RJ45, 10/100/1000BASE-TX). Two
interfaces can be used in combined mode. Multi-mode optical cable or single-mode optical
cable can be used according to the type of the optical module.
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
Course Name
Confidential Information of Huawei. No Spreading Without Permission
N-39
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission

More Related Content

What's hot

Lte basic parameters
Lte basic parametersLte basic parameters
Lte basic parameters
Linh Phạm
 
Ericsson important optimization parameters
Ericsson important optimization parametersEricsson important optimization parameters
Ericsson important optimization parameters
Pagla Knight
 
Using Propagation Delay in WCDMA RAN Optimization.ppt
Using Propagation Delay in WCDMA RAN Optimization.pptUsing Propagation Delay in WCDMA RAN Optimization.ppt
Using Propagation Delay in WCDMA RAN Optimization.ppt
AliNaPetrescuNita1
 
Lte irat-troubleshooting-guide
Lte irat-troubleshooting-guideLte irat-troubleshooting-guide
Lte irat-troubleshooting-guide
Denmark Wilson
 
Lte capacity monitoring
Lte capacity monitoringLte capacity monitoring
Lte capacity monitoring
Klajdi Husi
 
LTE Review - Load Balancing and Interfreq HO
LTE Review - Load Balancing and Interfreq HOLTE Review - Load Balancing and Interfreq HO
LTE Review - Load Balancing and Interfreq HO
paulo_campolina
 
Throughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systemsThroughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systems
Pei-Che Chang
 
LTE Basics
LTE BasicsLTE Basics
LTE Basics
Praveen Kumar
 
Drive Test Using Tems Investation 16
Drive Test Using Tems Investation 16Drive Test Using Tems Investation 16
Drive Test Using Tems Investation 16
Md Joynal Abaden
 
LTE Interference troubleshooting guide
LTE Interference troubleshooting guideLTE Interference troubleshooting guide
LTE Interference troubleshooting guide
Klajdi Husi
 
Nokia dictionary
Nokia dictionaryNokia dictionary
Nokia dictionary
Jetal Patel
 
huawei-lte-kpi-ref
huawei-lte-kpi-refhuawei-lte-kpi-ref
huawei-lte-kpi-ref
Abd Yehia
 
LTE Training Course
LTE Training CourseLTE Training Course
LTE Training Course
ChiehChun
 
LTE Key Technologies
LTE Key TechnologiesLTE Key Technologies
LTE Key Technologies
Abdulrahman Fady
 
Lte drive test parameter introduction
Lte drive test parameter introductionLte drive test parameter introduction
Lte drive test parameter introduction
Ray KHASTUR
 
259711021-LTE-Training.pptx
259711021-LTE-Training.pptx259711021-LTE-Training.pptx
259711021-LTE-Training.pptx
ssuser6f5356
 
Wcdma ps service_optimization_guide
Wcdma ps service_optimization_guideWcdma ps service_optimization_guide
Wcdma ps service_optimization_guide
azee_shah
 
08102014_Huawei handovers-handover-algo
08102014_Huawei handovers-handover-algo08102014_Huawei handovers-handover-algo
08102014_Huawei handovers-handover-algo
herobinh
 
lte physical layer overview
 lte physical layer overview lte physical layer overview
lte physical layer overview
Praveen Kumar
 
Lte kpis
Lte kpisLte kpis
Lte kpis
Anil kumar
 

What's hot (20)

Lte basic parameters
Lte basic parametersLte basic parameters
Lte basic parameters
 
Ericsson important optimization parameters
Ericsson important optimization parametersEricsson important optimization parameters
Ericsson important optimization parameters
 
Using Propagation Delay in WCDMA RAN Optimization.ppt
Using Propagation Delay in WCDMA RAN Optimization.pptUsing Propagation Delay in WCDMA RAN Optimization.ppt
Using Propagation Delay in WCDMA RAN Optimization.ppt
 
Lte irat-troubleshooting-guide
Lte irat-troubleshooting-guideLte irat-troubleshooting-guide
Lte irat-troubleshooting-guide
 
Lte capacity monitoring
Lte capacity monitoringLte capacity monitoring
Lte capacity monitoring
 
LTE Review - Load Balancing and Interfreq HO
LTE Review - Load Balancing and Interfreq HOLTE Review - Load Balancing and Interfreq HO
LTE Review - Load Balancing and Interfreq HO
 
Throughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systemsThroughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systems
 
LTE Basics
LTE BasicsLTE Basics
LTE Basics
 
Drive Test Using Tems Investation 16
Drive Test Using Tems Investation 16Drive Test Using Tems Investation 16
Drive Test Using Tems Investation 16
 
LTE Interference troubleshooting guide
LTE Interference troubleshooting guideLTE Interference troubleshooting guide
LTE Interference troubleshooting guide
 
Nokia dictionary
Nokia dictionaryNokia dictionary
Nokia dictionary
 
huawei-lte-kpi-ref
huawei-lte-kpi-refhuawei-lte-kpi-ref
huawei-lte-kpi-ref
 
LTE Training Course
LTE Training CourseLTE Training Course
LTE Training Course
 
LTE Key Technologies
LTE Key TechnologiesLTE Key Technologies
LTE Key Technologies
 
Lte drive test parameter introduction
Lte drive test parameter introductionLte drive test parameter introduction
Lte drive test parameter introduction
 
259711021-LTE-Training.pptx
259711021-LTE-Training.pptx259711021-LTE-Training.pptx
259711021-LTE-Training.pptx
 
Wcdma ps service_optimization_guide
Wcdma ps service_optimization_guideWcdma ps service_optimization_guide
Wcdma ps service_optimization_guide
 
08102014_Huawei handovers-handover-algo
08102014_Huawei handovers-handover-algo08102014_Huawei handovers-handover-algo
08102014_Huawei handovers-handover-algo
 
lte physical layer overview
 lte physical layer overview lte physical layer overview
lte physical layer overview
 
Lte kpis
Lte kpisLte kpis
Lte kpis
 

Viewers also liked

Lte transport requirements
Lte transport requirementsLte transport requirements
Lte transport requirements
Mary McEvoy Carroll
 
Lte optimization
Lte optimizationLte optimization
Lte optimization
tharinduwije
 
5.oep100330 lte cell_planning_issue1.10
5.oep100330 lte cell_planning_issue1.105.oep100330 lte cell_planning_issue1.10
5.oep100330 lte cell_planning_issue1.10
Wijaya Kusuma
 
Notes for scft
Notes for scftNotes for scft
Notes for scft
Sunil Verma
 
WiMAX & LTE Network Introduce For Swift
WiMAX & LTE Network Introduce For SwiftWiMAX & LTE Network Introduce For Swift
WiMAX & LTE Network Introduce For Swift
Gozie Lucas ubaozo
 
Chap05 gtp 03_kh
Chap05 gtp 03_khChap05 gtp 03_kh
Chap05 gtp 03_kh
Farzad Ramin
 
LTE paging.ppt
LTE paging.pptLTE paging.ppt
LTE paging.ppt
mravi423
 
Huawei hss9860 v900 r008c20 production description
Huawei hss9860 v900 r008c20 production descriptionHuawei hss9860 v900 r008c20 production description
Huawei hss9860 v900 r008c20 production description
Rabih Kanaan,PMP
 
Paging in LTE
Paging in LTEPaging in LTE
Paging in LTE
Surya Munda
 
VoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallVoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice Call
Jose Gonzalez
 
20090408 11c9892102535c929b1bw mypajf_eub8l
20090408 11c9892102535c929b1bw mypajf_eub8l20090408 11c9892102535c929b1bw mypajf_eub8l
20090408 11c9892102535c929b1bw mypajf_eub8l
Victor Etse
 
LTE Planning
LTE PlanningLTE Planning
LTE Planning
Abdulrahman Fady
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session Flow
Kent Loh
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration Flow
Kent Loh
 
Ims call flow
Ims call flowIms call flow
Ims call flow
Morg
 
Introduction to Evolved Packet Core Networks
Introduction to Evolved Packet Core NetworksIntroduction to Evolved Packet Core Networks
Introduction to Evolved Packet Core Networks
Inam Khosa
 
Throughput Calculation for LTE TDD and FDD System
Throughput Calculation for  LTE TDD and FDD SystemThroughput Calculation for  LTE TDD and FDD System
Throughput Calculation for LTE TDD and FDD System
Sukhvinder Singh Malik
 
LTE: X2 interface
LTE: X2 interfaceLTE: X2 interface
LTE: X2 interface
Schwannden Kuo
 

Viewers also liked (18)

Lte transport requirements
Lte transport requirementsLte transport requirements
Lte transport requirements
 
Lte optimization
Lte optimizationLte optimization
Lte optimization
 
5.oep100330 lte cell_planning_issue1.10
5.oep100330 lte cell_planning_issue1.105.oep100330 lte cell_planning_issue1.10
5.oep100330 lte cell_planning_issue1.10
 
Notes for scft
Notes for scftNotes for scft
Notes for scft
 
WiMAX & LTE Network Introduce For Swift
WiMAX & LTE Network Introduce For SwiftWiMAX & LTE Network Introduce For Swift
WiMAX & LTE Network Introduce For Swift
 
Chap05 gtp 03_kh
Chap05 gtp 03_khChap05 gtp 03_kh
Chap05 gtp 03_kh
 
LTE paging.ppt
LTE paging.pptLTE paging.ppt
LTE paging.ppt
 
Huawei hss9860 v900 r008c20 production description
Huawei hss9860 v900 r008c20 production descriptionHuawei hss9860 v900 r008c20 production description
Huawei hss9860 v900 r008c20 production description
 
Paging in LTE
Paging in LTEPaging in LTE
Paging in LTE
 
VoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallVoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice Call
 
20090408 11c9892102535c929b1bw mypajf_eub8l
20090408 11c9892102535c929b1bw mypajf_eub8l20090408 11c9892102535c929b1bw mypajf_eub8l
20090408 11c9892102535c929b1bw mypajf_eub8l
 
LTE Planning
LTE PlanningLTE Planning
LTE Planning
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session Flow
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration Flow
 
Ims call flow
Ims call flowIms call flow
Ims call flow
 
Introduction to Evolved Packet Core Networks
Introduction to Evolved Packet Core NetworksIntroduction to Evolved Packet Core Networks
Introduction to Evolved Packet Core Networks
 
Throughput Calculation for LTE TDD and FDD System
Throughput Calculation for  LTE TDD and FDD SystemThroughput Calculation for  LTE TDD and FDD System
Throughput Calculation for LTE TDD and FDD System
 
LTE: X2 interface
LTE: X2 interfaceLTE: X2 interface
LTE: X2 interface
 

Similar to 4 lte access transport network dimensioning issue 1.02

Lte questions adv
Lte questions advLte questions adv
Lte questions adv
Kehinde Yussuf
 
Lte technology
Lte technologyLte technology
Lte technology
Nitish Nagar
 
Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-
Amir Mehdi Ahmadian
 
4G-Questions interview.pdf
4G-Questions interview.pdf4G-Questions interview.pdf
4G-Questions interview.pdf
MohamedShabana37
 
152763323 lte-interview-question
152763323 lte-interview-question152763323 lte-interview-question
152763323 lte-interview-question
Hassan Daud
 
4g interview-question
4g interview-question4g interview-question
4g interview-question
Manpreet Singh
 
Lte interview questions
Lte interview questionsLte interview questions
Lte interview questions
GangaprasadT
 
EVERYTHING IN LTE
EVERYTHING IN LTEEVERYTHING IN LTE
EVERYTHING IN LTE
khalid abdeen
 
Paper lte-protocol-signaling
Paper lte-protocol-signalingPaper lte-protocol-signaling
Paper lte-protocol-signaling
Petrona Frensel M
 
Digital network lecturer7
Digital network  lecturer7Digital network  lecturer7
Digital network lecturer7
Jumaan Ally Mohamed
 
Lte basic
Lte basicLte basic
Lte basic
govind sable
 
J0343073079
J0343073079J0343073079
J0343073079
ijceronline
 
LTE optimization
LTE optimizationLTE optimization
Scalability Problems of the mobile wireless networks
Scalability Problems of the mobile wireless networksScalability Problems of the mobile wireless networks
Scalability Problems of the mobile wireless networks
Queen's University
 
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VWC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
SURESHA V
 
LTE Protocol Overview EMERSON EDUARDO RODRIGUES
LTE Protocol Overview EMERSON EDUARDO RODRIGUESLTE Protocol Overview EMERSON EDUARDO RODRIGUES
LTE Protocol Overview EMERSON EDUARDO RODRIGUES
EMERSON EDUARDO RODRIGUES
 
18094043-LTE-Protocol-Overview.pdf
18094043-LTE-Protocol-Overview.pdf18094043-LTE-Protocol-Overview.pdf
18094043-LTE-Protocol-Overview.pdf
MohamedShabana37
 
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
senthil krishnan
 
LTE_Basic_principle.pptx
LTE_Basic_principle.pptxLTE_Basic_principle.pptx
LTE_Basic_principle.pptx
Abhilash C A
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) Introduction
Guisun Han
 

Similar to 4 lte access transport network dimensioning issue 1.02 (20)

Lte questions adv
Lte questions advLte questions adv
Lte questions adv
 
Lte technology
Lte technologyLte technology
Lte technology
 
Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-
 
4G-Questions interview.pdf
4G-Questions interview.pdf4G-Questions interview.pdf
4G-Questions interview.pdf
 
152763323 lte-interview-question
152763323 lte-interview-question152763323 lte-interview-question
152763323 lte-interview-question
 
4g interview-question
4g interview-question4g interview-question
4g interview-question
 
Lte interview questions
Lte interview questionsLte interview questions
Lte interview questions
 
EVERYTHING IN LTE
EVERYTHING IN LTEEVERYTHING IN LTE
EVERYTHING IN LTE
 
Paper lte-protocol-signaling
Paper lte-protocol-signalingPaper lte-protocol-signaling
Paper lte-protocol-signaling
 
Digital network lecturer7
Digital network  lecturer7Digital network  lecturer7
Digital network lecturer7
 
Lte basic
Lte basicLte basic
Lte basic
 
J0343073079
J0343073079J0343073079
J0343073079
 
LTE optimization
LTE optimizationLTE optimization
LTE optimization
 
Scalability Problems of the mobile wireless networks
Scalability Problems of the mobile wireless networksScalability Problems of the mobile wireless networks
Scalability Problems of the mobile wireless networks
 
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VWC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
 
LTE Protocol Overview EMERSON EDUARDO RODRIGUES
LTE Protocol Overview EMERSON EDUARDO RODRIGUESLTE Protocol Overview EMERSON EDUARDO RODRIGUES
LTE Protocol Overview EMERSON EDUARDO RODRIGUES
 
18094043-LTE-Protocol-Overview.pdf
18094043-LTE-Protocol-Overview.pdf18094043-LTE-Protocol-Overview.pdf
18094043-LTE-Protocol-Overview.pdf
 
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
 
LTE_Basic_principle.pptx
LTE_Basic_principle.pptxLTE_Basic_principle.pptx
LTE_Basic_principle.pptx
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) Introduction
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 

4 lte access transport network dimensioning issue 1.02

  • 1.  1.01朱殿荣修订。根据郭宁反馈修订部分英文表述bug;将文中eNB全部更换为eNodeB; 修订文中部分图片不对其问题guo  1.02朱殿荣修订。郭宁:  p10,ip client 改为clock。  胶片中多处RLP,是否改为RLC?  另外,overhead这个词,名词解释有包头的意思吗?  是否应该是header。。。或者用overall header???? LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 2. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 3. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 4. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 5. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 6.  The eNodeB communicates with other NEs through the following five major interfaces:  The S1 interface exists between the eNodeB and the S-GW/MME. One eNodeB supports a maximum of 16 S1 interfaces.  The X2 interface exists between the eNodeBs. It mainly implements the X2 handover function. One eNodeB supports a maximum of 32 X2 interfaces.  The OM interface, also known as the OM channel, exists between the eNodeB and the network management system.  The clock interface, also known as the clock channel, exists between the eNodeB and the IP clock server. The eNodeB, functioning as the clock client, obtains the system clock from the clock packets that are periodically sent from the IP clock server.  The co-transmission interface, also called co-transmission channel, exists between the eNodeB and other devices. Traffic of other devices is forwarded through the IP routing function of the eNodeB. The other device can be a GSM/CDMA/WiMAX/UMTS/LTE base station or an IP-based device. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 7.  The S1 interface can be subdivided into the S1-MME interface supporting Control Plane signaling between the eNodeB and the MME and the S1-U Interface supporting User Plane traffic between the eNodeB and the S-GW.  S1 application protocol supports following functions  E-RAB Management - this incorporates the setting up, modifying and releasing of the E-RABs by the MME.  Initial Context Transfer - this is used to establish an S1UE context in the eNodeB, setup the default IP connectivity and transfer NAS related signaling.  UE Capability Information Indication - this is used to inform the MME of the UE Capability Information.  Mobility - this incorporates mobility features to support a change in eNodeB or change in RAT.  Paging  S1 Interface Management - this incorporates a number of sub functions dealing with resets, load balancing and system setup etc.  NAS Signaling Transport - this is used for the transport of NAS related signaling over the S1-MME Interface.  UE Context Modification and Release - this allows for the modification and release of the established UE Context in the eNodeB and MME respectively.  Location Reporting - this enables the MME to be made aware of the UEs current location within the network. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 8.  Defined by the IETF (Internet Engineering Task Force) rather than the 3GPP, SCTP was developed to overcome the shortfalls in TCP (Transmission Control Protocol) and UDP when transferring signaling information over an IP bearer. Functions provided by SCTP include:  Reliable delivery of higher layer payloads.  Sequential delivery of higher layer payloads.  Flow control.  GTP-U tunnels are used to carry encapsulated PDU (Protocol Data Unit) and signaling messages between endpoints. Numerous GTP-U tunnels may exist in order to differentiate between EPS bearer contexts and these are identified through a TEID (Tunnel Endpoint Identifier). LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 9.  X2 interface interconnects two eNodeBs and in so doing supports both a control plane and user plane. The principle control plane protocol is X2AP . This resides on SCTP where as the User Plane IP is transferred using the services of GTP-U and UDP .  The function of X2 AP is shown as following:  Mobility Management - this enables the serving eNodeB to move the responsibility of a specified UE to a target eNodeB. This includes Forwarding the User Plane, Status Transfer and UE Context Release functions.  Load Management - this function enables eNodeBs to communicate with each other in order to report resource status, overload indications and current traffic loading.  Error Reporting - this allows for the reporting of general error situations for which specific error reporting mechanism have not been defined.  Setting / Resetting X2 - this provides a means by which the X2 interface can be setup / reset by exchanging the necessary information between the eNodeBs.  Configuration Update - this allows the updating of application level data which is needed for two eNodeBs to interoperate over the X2 interface.  For the SCTP and GTP, it performs the similar functions as it performs in S1 interface. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 10. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 11.  IEEE1588 defines the PTP protocol, which applies to the standard Ethernet, with the precision to microseconds.IEEE1588 V2 released in 2008 mainly incorporates the improvements on higher frequency accuracy and less impact of the processing delay at the intermediate transport equipment.  The IEEE1588 standard targets precise synchronization of distributed and independent clocks in measurement and control systems. In LTE applications, high-accuracy frequency synchronization and time synchronization between clock servers and eNodeBs can be achieved. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 12.  When layer 1 network is adopted as the transport bearer network, the eNodeB and adjacent NEs are connected through the physical layer. The Synchronous Digital Hierarchy (SDH) network and Plesiochronous Digital Hierarchy (PDH) network are typical layer 1 networks. The eNodeB supports the access to the SDH/PDH network through the E1/T1 interface. The direct connection through the Ethernet interface, for example, the connection of the eNodeB and the S-GW through the GE optical cable is a layer 1 network. The following describes only the E1/T1 connection mode, because the direct connection mode is rare in the actual situations.  As shown above, the layer 1 network provides only the bearer function on the physical layer, which is the simplest transport bearer mode. In this mode, the transmission to the upper layers is transparent. When using a layer 1 networking solution, users need to configure the related data concerning the physical layer, such as the attributes of the E1/T1 interface.  The cost of renting the transport devices is usually high. In the case of the layer 1 network, the channels are allocated in fixed mode. Therefore, the bandwidth utilization is low. Besides, the bandwidth needs to be configured for each S1/X2 logical interface.  The layer 1 transport bearer network is usually applied to the GSM/UMTS system that provides mainly the CS service. It is rarely applied to the LTE system that provides mainly the PS service. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 13.  The layer 2 network is usually adopted as the transport bearer network of the LTE system. The layer 2 network in the LTE system is the Ethernet switching network. The major device is the Ethernet switch. The eNodeB accesses the Ethernet switching network through the FE/GE interface.  As shown above, the layer 2 network provides the bearer function on the MAC layer. The MAC layer is the data link layer protocol of the Ethernet. Complying with the IEEE 802.3, the MAC layer provides addressing and data access control mechanisms. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 14.  The layer 3 network in the LTE system is the IP routing network. The major device is the router. The eNodeB accesses the IP routing network through the FE/GE interface or the E1/T1 interface.  As shown above, the layer 3 network provides the bearer function on the IP layer. Users need to configure the physical layer, data link layer, and IP layer.  The configuration of the physical layer and data link layer involves the configuration of the E1/T1 interface and FE/GE interface.  The configuration of the IP layer involves the configuration of the IP addresses, IP route list, and DiffServ.  The layer 3 network is usually adopted as the transport bearer network of the LTE system. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 15. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 16. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 17. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 18. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 19.  MAC provides the interface between the E-UTRA protocols and the E-UTRA Physical Layer. In doing this it provides the following services:  Mapping - MAC maps the information received on the LTE Logical Channels into the LTE transport channels.  Multiplexing - The information provided to MAC will come from a RB (Radio Bearer) or multiple Radio Bearers. The MAC layer is able to multiplex different bearers into the same TB (Transport Block), thus increasing efficiency.  HARQ (Hybrid Automatic Repeat Request) - MAC utilizes HARQ to provide error correction services across the air. HARQ is a feature which requires the MAC and Physical Layers to work closely together.  Radio Resource Allocation - QoS (Quality of Service) based scheduling of traffic and signaling to users is provided by MAC. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 20.  The RLC protocol exists in the UE and the eNodeB. As its name suggests it provides “radio link” control, if required. In essence, RLC supports three delivery services to the higher layers:  TM (Transparent Mode) - This is utilized for some of the air interface channels, e.g. broadcast and paging. It provides a connectionless service for signaling.  UM (Unacknowledged Mode) - This is like Transparent Mode, in that it is a connectionless service; however it has the additional features of sequencing, segmentation and concatenation.  AM (Acknowledged Mode) - This offers an ARQ (Automatic Repeat Request) service. As such, retransmissions can be used. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 21.  PDCP (Packet Data Convergence Protocol) provides services to both the Control Plane and User Plane. The main PDCP functions include:  Header compression and decompression of IP datagrams using the ROHC (Robust Header Compression) protocol.  Maintenance of PDCP SN (Sequence Number) for radio bearers operating in RLC AM (Acknowledged Mode).  In-sequence delivery of upper layer PDU (Protocol Data Units) at handover.  Duplicate elimination of lower layer SDUs at handover for RLC AM radio bearers.  Ciphering and deciphering of User and Control Plane data.  Integrity protection and integrity verification of the Control Plane data.  Discarding of data on a timeout basis.  Discarding of data on a duplicate basis. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 22.  In radio systems, the resources on the LTE-Uu interface are far more precious than the processing capability of processors. Therefore, ROHC is suitable for radio systems, even though it is complex compared with earlier schemes. It is mainly used for VoIP services.  In LTE, the ROHC entity is located within the Packet Data Convergence Protocol (PDCP) entity on the user planes of the UE and the eNodeB, and is used only for the header compression and decompression of data packets on the user plane. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 23. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 24.  GTP-U tunnels are used to carry encapsulated PDU (Protocol Data Unit) between endpoints or in the case of the X2 interface.  Numerous GTP-U tunnels may exist in order to differentiate between EPS bearer contexts and these are identified through a TEID (Tunnel Endpoint Identifier).  The average header for GTP-U is 12 bytes, consist of following part  Version: Specify the GTP protocol version  P flag: Indicate whether another GTPv2-C message with its own header and body shall be present at the end of the current message  T flag: Indicate the presence or not of the TEID field.  Message Type: Indicate the type of GTP message.  TEID: Indicate the unique GTP channel. It is unique per EPS bearer for GTP-U and per PDN connection for GTP-C.  Sequence Number: Allows in-order delivery of user plane PDU. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 25. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 26. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 27.  Access control based on IEEE 802.1x ensure the authorized accesses of the eNodeB to the transport network. For details, see section ‎5.2 "Access Control Based on IEEE 802.1x." To adapt to the all-IP based transmission mode of the LTE system, the eNodeB uses the IPSec security mechanism to ensure the confidentiality, integrity, and availability of data transmission. IPSec services are the security services provided for the IP layer, and thus can be used by the upper-layer protocols such as the TCP, UDP, ICMP, and SCTP. IPSec is a protocol family used to guarantee the security for IP communication.  For transmission of IP packets, IPSec guarantees high-quality and interoperable security based on cryptology. Ciphering and integrity verification are performed on the IP layer between specific communicating parties to guarantee the following security features of packet transmission:  Data confidentiality: Ciphering protection is performed on user data, which is transmitted in ciphered text.  Data integrity: The received data is authenticated to check whether or not the data is modified.  Authentication: The data source is authenticated to guarantee that data is transmitted from an authenticated sender.  Replay protection: The attack by unauthorized users, who repeatedly transmit the captured packets, is prevented. The party under the attack does not accept the old or repeated packets. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 28.  IPSec supports two security protocols: the Authentication Header (AH) protocol and Encapsulation Security Protocol (ESP) protocol. The AH protocol performs integrity protection, and the ESP protocol performs both integrity protection and ciphering.  IPSec supports two packet encapsulation modes: transport mode and tunnel mode. The difference between the transport mode and the tunnel mode is the IP packet protection scope.  Transport mode: protects the effective payload and upper-layer protocols (ULPs) of IP packets. In transport mode, the IPSec headers (AH or ESP) are placed behind the IP header and before the ULPs.  Tunnel mode: protects the security for original IP packets. In tunnel mode, the original IP packet is encapsulated into a new IP packet, and the IPSec header is inserted between the headers (AH and/or ESP) of the new and original IP packets. The header of the original IP packet is protected as part of the effective payload. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 29.  Virtual Local Area Network (VLAN) is a data exchange technology derived from the traditional LAN.  VLAN allows LAN devices to be logically grouped into multiple network segments (that is, smaller LANs) to implement virtual workgroups. The hosts in different VLANs are separated from each other and they communicate with each other only through routers. A VLAN is a broadcast domain, that is, a host in a VLAN can receive the broadcast packets from the other hosts in the same VLAN but cannot receive the broadcast packets from other VLANs. The VLAN attaches different labels to the operation, administration, and maintenance (OAM) data and the traffic data. Thus, differentiated services can be provided. The VLAN also provides services of different priorities and security levels on the MAC layer.  The VLAN header consists of following parts:  TPID: Tag protocol identifier, indicate that it is the frame with 802.1Q, the value is fixed with 0x8100, the length is 2 bytes  PRI: Priority indicator, 3 bits  CFI: Canonical Format Indicator, 1 bit  VLAN ID: Indicate which VLAN belongs to, 12 bits LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 30. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 31. LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 32.  From the capacity dimensioning, we can get throughput of radio interface, including the overhead of radio interface. So the radio payload throughput can be calculated. During the IP transport, the additional overhead will be added, from the analysis of overhead, we can get the throughput of transport layer. LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 33.  PDCP: Packet Data Convergence Protocol, perform data integrity check and ciphering function.  ROHC: Robust of head compression, it is a kind of head compression technology  RLC: Radio link control protocol  MAC: Perform scheduling control function  CRC: Cyclic redundancy check LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 34. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 35. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 36. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 37. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 38.  The LMPT provides four Ethernet interfaces, that is, two optical interfaces (SFP, 100/1000BASE-FX) and two electrical interfaces (RJ45, 10/100/1000BASE-TX). Two interfaces can be used in combined mode. Multi-mode optical cable or single-mode optical cable can be used according to the type of the optical module. LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 39. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 40. Course Name Confidential Information of Huawei. No Spreading Without Permission N-39
  • 41. LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission