This document discusses how HARQ and ARQ work together in LTE to provide fast and reliable retransmissions. HARQ handles retransmissions quickly at the MAC layer, while ARQ provides more reliable feedback at the RLC layer. Together they satisfy the low error requirements of TCP. Situations where both are needed include residual HARQ errors and handovers. LTE improves on HSPA by having both protocols terminate in the same node for tighter integration.
Explain LTE RACH Configuration and Capacity.
My Question:
- How many UE preambles can be handled in 10 ms frame by eNodeB?
- How many UE preambles can be handled in T300 by eNodeB?
5G/NR wireless communication technology overview, architecture and its operating modes SA and NSA. Also an introduction to VoNR and other services overview of 5G network.
The key technologies of 5G namely MIMO and Network slicing are also explained.
Hello my friends
Unfortunately, if you want any of these files, please contact me by email and mention any reference you find, to give it to you.
My email: molham.shoriss@outlook.com
LTE
LTE Introduction
LTE Fundamental
LTE RNP Introduction
LTE Principles (Huawei eRAN 3.0)
LTE Access Fault Diagnosis
LTE Access Transport Network Dimensioning
LTE Air Interface ISSUE 1.05
LTE Cell Planning ISSUE1.10
LTE eRAN 3.0 Scheduling - Feature Parameter Description
LTE eRAN3.0 Idle Mode Behavior
LTE eRAN3.0 KPI Introduction
LTE eRAN3.0 - Mobility Management in Connected Mode - Feature Parameters Description
LTE Handover Fault Diagnosis
LTE Network Tuning ISSUE 1.00
LTE Protocols and Procedure
LTE Radio Network Capacity Dimensioning
LTE Radio Network Coverage Dimensioning
LTE Radio Resource Management Overview
LTE Scheduling
LTE (Eicsson)
01.LTE SAE System Overview
LTE 10A Air Interface
LTE L10A Access Transport Network
LTE L10A Radio Network Design
LTE L12 Initial Tuning
LTE L14 Radio Network Functionality LTE
LTE Protocols and Procedures
LTE System Techniques
LTE Throughput Troubleshooting Techniques
LTE Radio Access Radio Interface Dimensioning and Planning
MIMO in WCDMA and LTE
LTE L14 Radio Network Functionality LTE
LTE Huawei
LTE System Overview
LTE Air Interface
LTE Protocols and Signaling Procedures
LTE Network Performance Management (KPIs)
LTE Radio Network Coverage Dimensioning
LTE Cell Planning
LTE Access Fault Diagnosis
LTE Handover Fault Diagnosis
LTE Call Drop Diagnosis
LTE Traffic Fault Diagnosis
LTE Interference Troubleshooting Guide
LTE Optimization
LTE Troubleshooting Access Failures
Features 1. Idle Mode
Features 2. Intra Rat Handover
Features 3. Power Control
Features 4. Scheduling
Features 5. CS Fallback
Features 6. Physical Channel Resource Management
HedEx for LTE
eRAN_eRAN13.0_02_en_GEG09124
5G
5G System Design (Wiley)
HedEx for 5G
(For Engineer) 5G RAN2.0 Solution Technical Guideline
Hello my friends
Unfortunately, if you want any of these files, please contact me by email and mention any reference you find, to give it to you.
My email: molham.shoriss@outlook.com
Explain LTE RACH Configuration and Capacity.
My Question:
- How many UE preambles can be handled in 10 ms frame by eNodeB?
- How many UE preambles can be handled in T300 by eNodeB?
5G/NR wireless communication technology overview, architecture and its operating modes SA and NSA. Also an introduction to VoNR and other services overview of 5G network.
The key technologies of 5G namely MIMO and Network slicing are also explained.
Hello my friends
Unfortunately, if you want any of these files, please contact me by email and mention any reference you find, to give it to you.
My email: molham.shoriss@outlook.com
LTE
LTE Introduction
LTE Fundamental
LTE RNP Introduction
LTE Principles (Huawei eRAN 3.0)
LTE Access Fault Diagnosis
LTE Access Transport Network Dimensioning
LTE Air Interface ISSUE 1.05
LTE Cell Planning ISSUE1.10
LTE eRAN 3.0 Scheduling - Feature Parameter Description
LTE eRAN3.0 Idle Mode Behavior
LTE eRAN3.0 KPI Introduction
LTE eRAN3.0 - Mobility Management in Connected Mode - Feature Parameters Description
LTE Handover Fault Diagnosis
LTE Network Tuning ISSUE 1.00
LTE Protocols and Procedure
LTE Radio Network Capacity Dimensioning
LTE Radio Network Coverage Dimensioning
LTE Radio Resource Management Overview
LTE Scheduling
LTE (Eicsson)
01.LTE SAE System Overview
LTE 10A Air Interface
LTE L10A Access Transport Network
LTE L10A Radio Network Design
LTE L12 Initial Tuning
LTE L14 Radio Network Functionality LTE
LTE Protocols and Procedures
LTE System Techniques
LTE Throughput Troubleshooting Techniques
LTE Radio Access Radio Interface Dimensioning and Planning
MIMO in WCDMA and LTE
LTE L14 Radio Network Functionality LTE
LTE Huawei
LTE System Overview
LTE Air Interface
LTE Protocols and Signaling Procedures
LTE Network Performance Management (KPIs)
LTE Radio Network Coverage Dimensioning
LTE Cell Planning
LTE Access Fault Diagnosis
LTE Handover Fault Diagnosis
LTE Call Drop Diagnosis
LTE Traffic Fault Diagnosis
LTE Interference Troubleshooting Guide
LTE Optimization
LTE Troubleshooting Access Failures
Features 1. Idle Mode
Features 2. Intra Rat Handover
Features 3. Power Control
Features 4. Scheduling
Features 5. CS Fallback
Features 6. Physical Channel Resource Management
HedEx for LTE
eRAN_eRAN13.0_02_en_GEG09124
5G
5G System Design (Wiley)
HedEx for 5G
(For Engineer) 5G RAN2.0 Solution Technical Guideline
Hello my friends
Unfortunately, if you want any of these files, please contact me by email and mention any reference you find, to give it to you.
My email: molham.shoriss@outlook.com
Minimizing network delay or latency is a critical factor in delivering mobile broadband services; businesses and users expect network response will be close to instantaneous. Excess latency can have a profound effect on user experience—from excess delay during a simple phone conversation, reducing throughput at edge of cell coverage areas by reducing effectiveness of RAN optimization techniques, to slow- loading webpages and delays with streaming video. Response delays negatively impact revenue. In financial institutions, low latency networks have become a competitive advantage where even a few extra microseconds, can enable trades to execute ahead of the competition.
The direct correlation between delay and revenue in the web browsing experience is well documented. Amazon famously claimed that every 100 millisecond reduction in delay led to a one percent increase in sales. Google also stated that for every half second delay, it saw a 20 percent reduction in traffic.
For LTE network operators, control of latency is growing in importance as both an operational and business issue. Low latency is not only critical to maintaining the quality user experience (and therefore, the operator competitive advantage) of growing social, M2M, and real-time services, but latency reduction is fundamental to meeting the capacity expectations of LTE-A, where latency budgets will be cut in half and X2 will need to perform at microsecond speed.
Total network latency is the sum of delay from all the network components, including air interface, the processing, switching, and queuing of all network elements (core and RAN) along the path, and the propagation delay in the links. With ever tightening latency expectations, the relative contribution of any individual network element, such as a security gateway, must be minimized. For example, when latency budgets were targeting 150ms, a network node providing packet processing at 250μs was only adding 0.17% to the budget. However, in LTE-A, with latency targets slashed to 10ms, that same network node will consume almost 15x more of the budget. More important, when placed on the S1 with a target of only 1ms, 250 μs is 25% of the entire S1 latency allocation, and endangers meeting the microsecond latency needed at the X2. Clearly, operators need to apply stringent latency requirements for all network nodes, when designing LTE and LTE-A networks.
LTE Measurement: How to test a device
This course provides an overview with practical examples and exercises on how to test a LTE-capable device while performing standardized RF measurements such as power, signal quality, spectrum and receier sensitivity, and how to automate these measurements in a simple and cost-effective way. We will present testing of LTE handsets in terms of protocol signaling scenarios and handover to other radio technologies for interoperability. This course will demonstrate end-to-end (E2E), throughput and application testing using the Rohde & Schwarz R&S®CMW500 Wideband Radio Communication Tester. Examles of application tests are voice over LTE, (VoLTE) or Video over LTE.
Taller de comprensión para trabajar el cuento la selva loca de Tracey y Andrew Rogers con los estudiantes de transición y primer grado de las instituciones acompañadas con el Programa Todos a Aprender. Es necesario para trabajar con esta propuesta descargarla en el equipo y desde allí ver la presentación para que funcionen correctamente los hipervínculos.
A throughput analysis of tcp in adhoc networkscsandit
Transmission Control Protocol (TCP) is a connection oriented end-end reliable byte stream
transport layer protocol. It is widely used in the Internet.TCP is fine tuned to perform well in
wired networks. However the performance degrades in mobile ad hoc networks. This is due to
the characteristics specific to wireless networks, such as signal fading, mobility, unavailability
of routes. This leads to loss of packets which may arise either from congestion or due to other
non-congestion events. However TCP assumes every loss as loss due to congestion and invokes
the congestion control procedures. TCP reduces congestion window in response, causing unnecessary
degradation in throughput. In mobile ad hoc networks multi-hop path forwarding further
worsens the packet loss and throughput. To understand the TCP behavior and improve the
TCP performance over mobile ad hoc networks considerable research has been carried out. As
the research is still active in this area a comprehensive and in-depth study on the TCP throughput
and the various parameters that degrade the performance of TCP have been analyzed. The
analysis is done using simulations in Qualnet 5.0
Ctcp a cross layer information based tcp for manetijasuc
Traditional TCP cannot detect link contention losses and route failure losses which occur in MANET and
considers every packet loss as congestion. This results in severe degradation of TCP performance. In this
research work, we modified the operations of TCP to adapt to network states. The cross-layer notifications
are used for adapting the congestion window and achieving better performance. We propose Cross-layer
information based Transmission Control Protocol (CTCP) which consists of four network states.
Decelerate state to recover from contention losses, Cautionary state to deal with route failures, Congested
state to handle network congestion and Normal state to be compatible with traditional TCP. Decelerate
state makes TCP slow down if the packet loss is believed to be due to contention rather than congestion.
Cautionary state suspends the TCP variables and after route reestablishment resumes with conservative
values. Congestion state calls congestion control when network is actually congested and normal state
works as standard TCP. Simulation results show that network state based CTCP is more appropriate for
MANET than packet loss based traditional TCP.
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...IJERA Editor
The Transport Control Protocol (TCP) is used to establish and control a session between two endpoints. The problem is that in 802.11 wireless environments TCP always considers that the packet loss is caused by network congestion. However, in these networks packet loss are usually caused by the high bit error rate, and the wireless link failures. Researchers found out that TCP performance in wireless networks can be highly enhanced as long as it is feasible to identify the packet loss causes; hence appropriate measures can be dynamically applied during an established TCP session in order to adjust the session parameters. This paper proposes an endto-end adaptive mechanism that allows the TCP session to dynamically adjust the RTO (Retransmission Timeout) of a TCP session; the server will have to adjust the timers based on feedbacks from clients. Feedbacks are piggybacked in the TCP Options header field of the ACK (Acknowledgment) messages. A feedback is an approximation of the time needed by the wireless channel to get the errors fixed. The mechanism has been validated using numerical analysis and simulations, and then compared to the original TCP protocol. Simulation results have shown better performance in terms of number of retransmissions at the server side due to the decrease in the number of timeouts; and thus lowest congestion on the wireless access point.
The performance of wireless ad hoc networks is impacted significantly by the way TCP reacts to lost packets. TCP was designed specifically for wired, reliable networks; thus, any packet loss is attributed to congestion in the network. This assumption does not hold in wireless networks as most packet loss is due to link failure. In our research we analyzed several implementations of TCP, including TCP Vegas, TCP Feedback, and SACK TCP, by measuring throughput, retransmissions, and duplicate acknowledgements through simulation with ns-2. We discovered that TCP throughput is related to the number of hops in the path, and thus depends on the performance of the underlying routing protocol, which was DSR in our research.
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
Power Control in Mobile Ad Hoc networks is a critical issue, since nodes are powered by batteries.The
main idea of power control schemes is to use different power levels for RTS/CTS and DATA/ACK. These
schemes may degrade network throughput and reduce energy efficiency of the network. In this paper we
have evaluated the performance of Improved Autonomous Power Control MAC Protocol (IAPCMP),that
allows nodes to dynamically adjust power levels for transmission of DATA/ACK according to the distance
between the transmitter and its neighbors.In IAPCMP power level for transmission of RTS/CTS is also
adjustable. This also used maximum power level for transmitting DATA/ACK periodically to make
neighboring nodes aware about ongoing transmission. The performance of IAPCMP is evaluated through
the metrics namely, packet delivery ratio and rate of energy efficiency.The simulation results show
significant improvement in protocol.
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...cscpconf
TCP congestion control mechanism is highly dependent on MAC layer Backoff algorithms that
predict the optimal Contention Window size to increase the TCP performance in wireless adhoc
network. This paper critically examines the impact of Contention Window in TCP congestion
control approaches. The modified TCP congestion control method gives the stability of
congestion window which provides higher throughput and shorter delay than the traditional TCP. Various Backoff algorithms that are used to adjust Contention Window are simulatedusing NS2 along with modified TCP and their performance are analyzed to depict the influence of Contention Window in TCP performance considering the metrics such as throughput, delay, packet loss and end-to-end delay
A Survey of Different Approaches for Differentiating Bit Error and Congestion...IJERD Editor
TCP provides reliable wireless communication. The packet loss occurs in wireless network during
the data transmission and these losses are always classified as congestion losses. While Packet is also lost due to
random bit error. But traditional TCP always consider as packet is lost due to congestion and reduce it
congestion window. Thus, TCP gives poor performance in wireless link. Many TCP variants have been
proposed for congestion control but they cannot distinguish error either due to congestion or due to bit error thus
it reduces congestion window every time but when there is a bit error then no need to reduce the transmission
rate. In this survey the general approaches taken for differentiating congestion or bit error has been discussed.
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...IJCNCJournal
With the proliferation of mobile and wireless computing devices, the demand for continuous network connectivity exits for various wired-and-wireless integrated networks. Since Transmission Control Protocol (TCP) is the standard network protocol for communication on the Interne, any wireless network with Internet service need to be compatible with TCP. TCP is tuned to perform well in traditional wired
networks, where packet losses occur mostly because of congestion. However cellular wireless network
suffers from significant losses due to high bit errors and mobile handoff. TCP responds to all losses by
invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance. This
paper presents an improved Explicit Loss Notification algorithm to distinguish between packet loss due to congestion and packet loss due to wireless errors and handoffs. Simulation results show that the proposed protocol significantly improves the performance of TCP over cellular wireless network in terms of throughput and congestion window dynamics.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Harq & arq interactions in lte
1. HARQ & ARQ INTERACTIONS
IN LTE NORMAL OPERATION
& HANDOVER
- Richa Samel
rsamel@smu.edu
2. TECHNOLOGY GOALS
Why use both HARQ and ARQ
Challenges resulting from TCP
requirements and how HARQ & ARQ
provide a solution
Situations where both HARQ & ARQ
are necessary
How this technology addresses the
challenges faced in HSPA
How losses due to mobility are
avoided
3. OVERVIEW OF HARQ & ARQ
Retransmissions of missing or data units in error are
handled primarily by the hybrid-ARQ mechanism in the MAC
layer, complemented by the ARQ retransmission
functionality of the RLC layer in LTE.
IEEE Communications Magazine April 2009: The LTE Link Layer Design
4. Need for both HARQ & ARQ
The reasons for having a two-level
retransmission structure can be found in the
trade-off between fast and reliable feedback of
the status reports.
The hybrid-ARQ mechanism provides very fast
retransmissions which is suitable for high
speeds used in LTE, whereas the ARQ is
responsible for reliability
Usually HARQ can deal with most transmission
errors but sometimes the mechanism fails and
another one, that is ARQ is also needed.
5. HARQ FEEDBACK
HARQ feedback is fast and frequent to correct
transmission errors as soon as possible so
that the end-to-end RTT is low.
A synchronous one-bit ACK/NACK signal is
sent every transmission attempt and the timing
of the feedback message is used to identify
the corresponding data transmission.
However, this binary feedback is
susceptible to transmission errors.
6. ARQ STATUS REPORTS
An additional ARQ protocol layer provides a
much more reliable feedback mechanism based
on asynchronous status reports with explicit
sequence numbers that are protected by a cyclic
redundancy check (CRC).
This implies that the receiver of the status
report can detect any errors in the report
through the CRC.
HARQ is also applied to status messages.
The combination of the two protocols can be
viewed as ONE retransmission mechanism with
TWO feedback channels.
7. Challenges due to TCP
requirements
Although it is possible to attain an arbitrarily
low error probability of the hybrid-ARQ
feedback, it comes at a cost in transmission
power.
Keeping the cost reasonable typically results
in a feedback error rate of around 1%, which
results in a hybrid-ARQ residual error rate of
a similar order.
Such an error rate is in many cases far too
high; high data rates with TCP may require
almost error-free delivery of packets to the
TCP protocol layer
8. Challenges due to TCP
requirements
As an example, for data rates
exceeding 100 Mbit/s, a packet-loss
probability less than 10^(-5) is
required.
The reason is that TCP assumes
packet errors to be due to congestion
in the network.
Any packet error therefore triggers
the TCP congestion-avoidance
mechanism with a corresponding
decrease in data rate.
9. HARQ & ARQ together satisfy
TCP requirements
Compared to the hybrid-ARQ
acknowledgements, the RLC status reports are
transmitted relatively infrequently and thus the
cost of obtaining a reliability of 10^(-5) or lower
is relatively small.
Hence, the combination of hybrid-ARQ and RLC
attains a good combination of small round-trip
time and a modest feedback overhead where
the two components complement each other –
fast retransmissions due to the hybrid-ARQ
mechanism and reliable packet delivery due to
10. TYPES OF HARQ ERRORS
Residual HARQ errors: NACK is
misinterpreted as ACK, Maximum
number of retransmissions is reached,
DTX misinterpretation as ACK. In
these cases, the receiver does not
get the correct data
Non-Residual HARQ errors: ACK
misinterpreted as NACK. Receiver
gets duplicate data which can be
just discarded.
11. NEED FOR ARQ/HARQ
INTERACTIONS
For Residual HARQ errors
For RLC Acknowledged Mode(AM)
For non real time, delay tolerant
applications
Eg web browsing, email
12. SITUATIONS WHERE ARQ
INTERACTS WITH HARQ
When maximum retransmissions are reached
and the data transmission is unsuccessful
When a receiver expects a HARQ
retransmission but sees no transmission in
the expected TTI or receives a new
transmission. This is due to a NACK to ACK
error
If the UE misses the scheduling information
and the eNB misinterprets the DTX as ACK.
13. NACK TO ACK ERROR
The second error case is detected by the
HARQ receiver, because it expects another
HARQ retransmission but it receives a new
transmission.
http://www.ntpo.org.tw/tjc/presentation/5_A%20Fast%20Retransmission%20Technol
ogy%20for%20the%203GPP%20Long%20Term%20Evolution.pdf
14. NACK TO ACK ERROR
In this case the receiver sends two
feedback messages. The first is the
ordinary HARQ feedback for the new
transmission.
In addition, it sends an explicit ARQ
feedback message indicating the
residual HARQ error with timing
reference
15. DTX TO ACK ERROR
The third error case i.e. the receiver failed to
detect the transmission, occurs when a receiver
does not send HARQ feedback, but the transmitter
misinterprets that it received an ACK
http://www.ntpo.org.tw/tjc/presentation/5_A%20Fast%20Retransmission%20Technolo
gy%20for%20the%203GPP%20Long%20Term%20Evolution.pdf
16. DTX TO ACK ERROR
This cannot be detected at the HARQ
layer, because the receiving HARQ entity is
not aware that it missed anything.
So the RLC at the receiver can detect the
missing PDU based on ARQ Sequence
Number
The ARQ sequence number has to be used
in the reliable feedback, because the receiver
has no timing reference to the failed
transmission.
17. IMPROVEMENTS IN LTE OVER
HSPA
In HSPA, the HARQ and ARQ protocol
operate basically independent of each other.
The different protocol termination points on
the network side (ARQ in RNC, HARQ in
NodeB) do not provision for a tight coupling
between the two.
For LTE, both HARQ and ARQ are
terminated in the same nodes, in UE and
eNodeB. This allows for a tighter
interworking.
18. HSPA PROTOCOL STACK
Dr. H. H’mimy ‘s slides on EETS 8315 Advanced Topics in Wireless
Communication
19. DISADVANTAGE OF
HARQ/ARQ in HSPA
ARQ protocols often use timers to protect
against certain deadlock situations. In
HSPA, the configuration of these timers is
complex since the network architecture
might be very different from one network to
another resulting in different delays.
Thus, the timers often need to be set to
cope with worst case scenarios. This may
slow down the protocol operations
unnecessarily.
20. ADVANTAGES of HARQ/ARQ in
LTE
If protocols are operated in the same node,
it is more efficient to use triggers to inform
an upper protocol of certain events rather
than relying on upper layer timers. This
eliminates delays.
Second, even if two protocols are specified,
the implementation of these two protocols
might make use of certain shortcuts. For
example, the same memory could be used
to store data units. Also protocol states can
be shared easily
21. HSPA v/s LTE HANDOVER
In HSPA, since HARQ resides in the
NodeB, while ARQ resides in RNC, the
RNC can keep a track of the RLC
sequence numbers and their current states
and provide this information to the new
NodeB
In LTE this is not possible as both
HARQ/ARQ terminate at the same layer.
The target eNB has no idea of the RLC
states of the source. So the challenge of
how to achieve seamless mobility arises
22. SOLUTIONS FOR
HANDOVER
During handovers, there are two alternatives
that could be implemented for RLC AM:
1) The complete ARQ state including the
buffers is transferred from one eNB to the
other. This allows that the ARQ can basically
continue in the new cell. Such an approach is
complex
2) In the downlink, all unacknowledged SDUs
are forwarded to the new eNB. In the
uplink, all unacknowledged SDUs are
23. SOLUTIONS FOR
HANDOVER
Therefore handover in LTE for RLC AM contains
losses which are dealt by retransmissions.
In order to avoid wasting radio resources by
performing unnecessary retransmissions, the
MAC scheduler tries to complete all ongoing
HARQ processes before the connection in the
old cell is released.
PDCP SN reports are sent by both UE and eNB
to avoid duplicate transmissions. Duplicate
removal and in-sequence delivery of the PDCP
SDUs also are handled by the PDCP, based on
24. REFERENCES
CHAPTER 12: RETRANSMISSION PROTOCOLS from 4G LTE/
LTE-Advanced for Mobile Broadband by Erik Dahlman, Stefan
Parkvall and Johan Skold
IEEE Paper : ARQ Concept for the UMTS Long-Term Evolution by
Michael Meyer, Henning Wiemann, Mats S ågfors, Johan Torsner,
Jung-Fu (Thomas) Cheng
IEEE Communications Magazine April 2009: The LTE Link Layer
Design by Anna Larmo, Magnus Lindström, Michael Meyer,
Ghyslain Pelletier, Johan Torsner, and Henning Wiemann
http://www.ntpo.org.tw/tjc/presentation/5_A%20Fast%20Retransm
ission%20Technology%20for%20the%203GPP%20Long%20Term
%20Evolution.pdf
http://www.etsi.org/deliver/etsi_ts/136300_136399/136300/08.06.0
0_60/ts_136300v080600p.pdf ie 3GPP TS 36.300 version 8.6.0
Release 8 Page 45