E-UTRAN R10 / LTE-Advanced Delta course focuses on differences between E-UTRAN R8/R9 and E-UTRAN R10 also known as LTE-Advanced. The training covers a functional description of all major R10 enhancements together with the required signalling protocols modifications.
The document discusses the random access channel (RACH) procedure in LTE networks. It covers:
1) The RACH procedure is used for initial access and synchronization between the UE and network. The physical random access channel (PRACH) is used to perform the initial access.
2) The RACH procedure is performed in scenarios like initial access, re-establishment, handover, and when uplink synchronization is lost.
3) The document provides details on the different steps of the contention-based and non-contention based RACH procedures.
This document specifies 5G RRC parameters including message definitions and information elements for timers, counters, constants, and UE variables. It defines RRC messages that may be sent on different logical channels and provides descriptions of message fields. It also specifies bandwidth part configurations, measurement reporting, reconfiguration messages, and beam failure recovery resources.
IRJET- Analysis of Slotted CSMA/CA of IEEE 802.15.4IRJET Journal
This document analyzes the performance of the slotted CSMA/CA MAC protocol used in the Contention Access Period of IEEE 802.15.4 beacon-enabled mode wireless networks. It discusses key aspects of the IEEE 802.15.4 standard including operating frequency bands, data rates, beacon enabled and non-beacon enabled modes, and superframe structure. The document also provides details on the slotted CSMA/CA channel access mechanism and evaluates the impact of protocol parameters such as backoff exponent, contention window size, and frame size on network performance metrics like throughput, delay, and energy consumption.
This document provides an overview of the key components and protocols in 3G and 4G mobile networks. It includes a high-level diagram of the overall 4G architecture and summaries of protocols like S1, X2, NAS, RRC. Key concepts covered include the PDCP, RLC, MAC and PHY layers, QoS classes, paging, attachment, handover procedures between eNodeBs and between 4G and 3G networks.
The document discusses the challenges of troubleshooting problems that occur before any signaling messages are sent, using the example of a UE that gets stuck at "Searching Network...". It explains that to troubleshoot such issues, one needs in-depth knowledge of the physical layer procedures for initial access, including the Random Access Channel (RACH) process, as well as equipment that can monitor physical layer signaling. It then provides details on the RACH process for LTE, including when it occurs, the contention-based vs. contention-free approaches, preamble structure, and timing of preamble transmission and response.
This document discusses various topics related to Long Term Evolution (LTE) including call flow, radio link failure, discontinuous reception (DRX), paging, scheduling, random access channel (RACH) procedure, self-organizing networks (SON), and quality of service (QoS). It provides details on the call flow process when a user equipment (UE) is powered on, performs initial cell selection and attachment, and establishes a default bearer. It also describes procedures for radio link failure, DRX, paging, scheduling, RACH, SON functions including self-configuration and optimization, and QoS with default and dedicated bearers.
The document discusses LTE channels and the MAC layer. It describes the functions of the MAC layer, including mapping between transparent and logical channels, error correction through HARQ, and priority handling with dynamic scheduling. It then provides details on the LTE downlink channels, including both logical channels like PCCH, BCCH, CCCH, and DCCH, as well as transport channels like PCH, BCH, DL-SCH, MCH, and PDCCH.
The document discusses the random access channel (RACH) procedure in LTE networks. It covers:
1) The RACH procedure is used for initial access and synchronization between the UE and network. The physical random access channel (PRACH) is used to perform the initial access.
2) The RACH procedure is performed in scenarios like initial access, re-establishment, handover, and when uplink synchronization is lost.
3) The document provides details on the different steps of the contention-based and non-contention based RACH procedures.
This document specifies 5G RRC parameters including message definitions and information elements for timers, counters, constants, and UE variables. It defines RRC messages that may be sent on different logical channels and provides descriptions of message fields. It also specifies bandwidth part configurations, measurement reporting, reconfiguration messages, and beam failure recovery resources.
IRJET- Analysis of Slotted CSMA/CA of IEEE 802.15.4IRJET Journal
This document analyzes the performance of the slotted CSMA/CA MAC protocol used in the Contention Access Period of IEEE 802.15.4 beacon-enabled mode wireless networks. It discusses key aspects of the IEEE 802.15.4 standard including operating frequency bands, data rates, beacon enabled and non-beacon enabled modes, and superframe structure. The document also provides details on the slotted CSMA/CA channel access mechanism and evaluates the impact of protocol parameters such as backoff exponent, contention window size, and frame size on network performance metrics like throughput, delay, and energy consumption.
This document provides an overview of the key components and protocols in 3G and 4G mobile networks. It includes a high-level diagram of the overall 4G architecture and summaries of protocols like S1, X2, NAS, RRC. Key concepts covered include the PDCP, RLC, MAC and PHY layers, QoS classes, paging, attachment, handover procedures between eNodeBs and between 4G and 3G networks.
The document discusses the challenges of troubleshooting problems that occur before any signaling messages are sent, using the example of a UE that gets stuck at "Searching Network...". It explains that to troubleshoot such issues, one needs in-depth knowledge of the physical layer procedures for initial access, including the Random Access Channel (RACH) process, as well as equipment that can monitor physical layer signaling. It then provides details on the RACH process for LTE, including when it occurs, the contention-based vs. contention-free approaches, preamble structure, and timing of preamble transmission and response.
This document discusses various topics related to Long Term Evolution (LTE) including call flow, radio link failure, discontinuous reception (DRX), paging, scheduling, random access channel (RACH) procedure, self-organizing networks (SON), and quality of service (QoS). It provides details on the call flow process when a user equipment (UE) is powered on, performs initial cell selection and attachment, and establishes a default bearer. It also describes procedures for radio link failure, DRX, paging, scheduling, RACH, SON functions including self-configuration and optimization, and QoS with default and dedicated bearers.
The document discusses LTE channels and the MAC layer. It describes the functions of the MAC layer, including mapping between transparent and logical channels, error correction through HARQ, and priority handling with dynamic scheduling. It then provides details on the LTE downlink channels, including both logical channels like PCCH, BCCH, CCCH, and DCCH, as well as transport channels like PCH, BCH, DL-SCH, MCH, and PDCCH.
WCDMA uses an OSI model with 7 layers. The lower 3 layers - physical, data link, and network layers - are most important for WCDMA. The physical layer uses different physical channels to transmit data over the air interface. Logical channels define how data is transferred, transport channels define how data is transmitted, and physical channels carry payload data and define signal characteristics. There are three types of channels - logical, transport, and physical - that work together to transmit various types of control and traffic data between the UE and base station.
Three UEs (UE-A, UE-B, UE-C) initiate the random access procedure at the same time to connect to the eNodeB. UE-A and UE-B select the same preamble, resulting in a collision. UE-C selects a different preamble. The eNodeB responds to the preambles, assigning resources to UE-A and UE-C. During contention resolution, UE-A's connection request is acknowledged, while UE-B's collides and fails. UE-B then retries the random access procedure with a new preamble.
This document provides an overview of the BICC protocol and application in R4 networks. It discusses BICC protocol structure and message introduction, signaling flows including examples of call setup with forward and backward bearer establishment. It also covers topics like BICC protocol model, message structure, blocking and unblocking of call instances, main BICC messages, tunnel bearer setup, codec negotiation and call release scenarios. Signaling flows and examples are provided to illustrate different call setup scenarios.
This document provides an overview of the LTE radio layer 2, radio resource control (RRC), and radio access network architecture. It discusses the E-UTRAN architecture including eNodeBs, home eNodeBs, and relays. It describes the user plane including bearer services, the user plane protocol stack with PDCP, RLC, and MAC layers, and security and transport functions. It also outlines the control plane including connection control and RRC states, and highlights features like interoperability, self-organizing networks, positioning, broadcasting, latency evaluations, and LTE-Advanced.
The document discusses the SIGTRAN protocol stack and its components SCTP and M3UA. It provides an overview of these protocols, including their objectives, features, message structures, and functions in transferring SS7 signaling over IP networks. Key concepts discussed include SIGTRAN layers, SCTP transmission addressing, association establishment and termination, and M3UA routing, entities, and message transfer procedures.
There are three categories of channels in 3G LTE - physical, transport, and logical channels. Physical channels carry user data and control messages over the transmission medium. Transport channels offer information transfer between the physical layer and higher layers. Logical channels provide services to the MAC layer and carry different types of control and traffic data.
This document provides an introduction to LTE/E-UTRA technology, including both FDD and TDD modes of operation. It describes the key requirements for UMTS Long Term Evolution such as high data rates, low latency, and improved spectrum efficiency compared to previous standards. The document then covers various aspects of the LTE standard, including the OFDMA downlink and SC-FDMA uplink transmission schemes, MIMO concepts, protocol architecture, UE capabilities, and testing considerations. Abbreviations used and additional references are also provided.
This document discusses the Packet Data Convergence Protocol (PDCP) sublayer in 3GPP LTE networks. It describes the key functions of PDCP including header compression, ciphering, integrity protection, and transmission of user and control plane data. It also explains PDCP's use of ROHC for header compression and the various PDCP protocol data unit formats used for control and user plane messages.
TTI bundling is a technique used in LTE to improve uplink coverage for voice calls by transmitting the same transport block containing voice data over multiple consecutive subframes without waiting for HARQ feedback. This provides a coding gain of up to 4dB compared to single subframe transmission, allowing power-limited UEs at the cell edge to be received with sufficient quality. TTI bundling can be implemented in both FDD and TDD LTE networks but with some differences due to limitations on consecutive uplink subframes in TDD configurations. It provides lower latency voice transmission compared to alternatives like RLC segmentation while reducing overhead.
The document provides an overview of Next Generation Synchronous Digital Hierarchy (NG-SDH) which brings together SONET/SDH and Ethernet networks. It discusses how virtual concatenation allows efficient transport of Ethernet and other services over SDH networks by virtually concatenating payloads across multiple containers. Sequence indicators and frame counters are used to distinguish and maintain timing between virtually concatenated members. This overcomes issues with inefficient contiguous concatenation and fixed payload sizes in traditional SDH.
This document provides an overview of two fundamental mechanisms in LTE access networks: random access and buffer status reporting. It describes the random access procedure used by UEs to connect to the network, including the exchange of preambles, responses, and temporary identifiers. It also explains the buffer status reporting procedure, where UEs indicate to the base station the amount of data waiting to be transmitted so that uplink resources can be allocated. Key parameters for both mechanisms are defined in 3GPP specifications to optimize performance and control signaling in the network.
Carrier aggregation has evolved in HSPA through 3GPP releases to increase peak data rates and network capacity. Release 8 introduced dual-carrier HSDPA using two adjacent 5 MHz carriers. Release 9 specified dual-band operation using separate frequency bands and dual-carrier HSUPA. Release 10 supported four-carrier HSDPA across two frequency bands, doubling peak rates to 168 Mbps. Release 11 allows for up to 8 aggregated carriers of 5 MHz each for a maximum of 40 MHz total bandwidth and peak rates over 300 Mbps. Carrier aggregation significantly increases HSPA throughput with each new release.
This document outlines the 3GPP specifications process for developing new mobile network systems and features. It follows a three stage process:
Stage 1 defines service requirements. Stage 2 defines the network architecture, elements, and high-level flows. Stage 3 defines protocols, state machines, and messages.
This process was applied to developing LTE, where Stage 1 documents defined requirements like throughput rates and latency. Stage 2 documents described the overall LTE system architecture. Numerous Stage 3 specifications then defined the protocols that enable LTE.
The document summarizes the results of an email discussion on modifying RRC procedures in TS 25.331. It lists various RRC procedure specifications that were discussed and agreed upon. It is proposed to replace the text in chapters 8 and 9 of TS 25.331 with the text from this document, except for two procedures still being specified. The chapter structures would also be adjusted accordingly.
The document discusses LTE system signaling procedures. It begins with objectives of understanding LTE architecture, elementary procedures of interfaces like S1, X2 and Uu, and procedures for service setup, release and handover. It then covers topics like system architecture, bearer service architecture, elementary procedures on Uu including connection establishment and release, and procedures on S1 and X2 interfaces. The document aims to help readers understand LTE signaling flows and procedures.
The document describes the different states in UTRA RRC connected mode, including Cell_DCH, Cell_FACH, Cell_PCH, and URA_PCH states. It provides details on the Cell_DCH state, including how a UE can enter Cell_DCH state, internal procedures that can be performed in Cell_DCH state without state transitions, and triggers for transitions from Cell_DCH state to other states like Cell_FACH. Timers are defined for supervising RB and SRB activity and inactivity detection in Cell_DCH state.
Carrier aggregation is a technique used in LTE-Advanced to bond together multiple component carriers to increase overall transmission bandwidth beyond 20MHz and achieve higher data rates up to 1Gbps. It allows aggregation of up to 5 carriers that may be contiguous or non-contiguous in the same or different bands. The component carriers can have varying bandwidths from 1.4MHz to 20MHz. Carrier aggregation provides flexibility to efficiently use fragmented spectrum and achieve very high throughput using wider transmission bandwidths. It requires changes to the physical, MAC and RRC layers for proper operation across multiple carriers.
Synchronization is important in telecommunication networks to avoid data errors. All node clocks must be synchronized to the master clock to minimize errors. The TimeSource 3600 GPS receiver provides precise timing synchronization at the picosecond level for telecom networks. It can be monitored using TimeScan Craft and TimeScan NMS software to ensure the network maintains precise synchronization.
The document describes CSFB (CS fallback) and SMSoSGs (SMS over SGs) procedures in EPS. It discusses:
1. The protocol stack used on the SGs interface between MME and MSC, including SGsAP over SCTP.
2. Key SGs procedures like location update and detach to coordinate EPS and CS domain location information between MME and VLR.
3. How the MME allocates TAIs and LAIs to help optimize CSFB handovers between E-UTRAN and GERAN/UTRAN.
The 3GPP evolution for the 3G mobile system created the new base station system, called Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) and a new core network, called Evolved Packet Core (EPC) as a result of two standardisation projects: Long Term Evolution (LTE) and System Architecture Evolution (SAE). Under these specifications a mobile phone gets access to higher bandwidth with low latency in an improved and more efficient network architecture. The standards define an all-IP network as a base for the E-UTRAN/EPC. The E-UTRAN/EPC does not have a separate PS data traffic and CS voice network, both communicate over the same new Evolved Packet System (EPS) network. LTE/EPS Technology course is an intermediate technical course, which covers all aspects of architecture and functionality of the EPS.
“Signalling in GSM BSS” course focuses on signalling between GSM nodes within Base Station
System (BSS). During the course all protocols and signalling procedures on all interfaces within BSS
are presented in details. The organisation of channels of air interface and cell parameters is also
widely covered in the course. The course also describes parts of the Signalling System No. 7 that are
relevant for BSS and presents co-operation between Core Network and BSS during procedures like
call set-up and location update.
Unlike previous 3GPP wireless technologies, LTE has no Circuit Switched (CS) bearer to support voice, so carrying voice over LTE requires a migration to a Voice over IP (VoIP) solution. Until this migration occurs, LTE-capable handsets need to revert to 2G or 3G for voice calls, which can reduce quality or even suspend Packed Switched (PS) services. The GSMA's IP Multimedia Subsystem (IMS) Profile for Voice and SMS document, commonly referenced as Voice over LTE (VoLTE), defines the mandatory set of features that the mobile device and network are required to implement in order to guarantee an interoperable, high quality IMS-based telephony service over LTE. The course focuses on VoLTE services, underpaying IMS architecture, basic procedures and their impact on existing operator infrastructure. The intermediate solutions like CSFB and SMSoSGs are also explained as they can be used concurrently with VoLTE to support roaming subscribers and emergency calls as long as the operator is not ready to move those service to VoLTE.
WCDMA uses an OSI model with 7 layers. The lower 3 layers - physical, data link, and network layers - are most important for WCDMA. The physical layer uses different physical channels to transmit data over the air interface. Logical channels define how data is transferred, transport channels define how data is transmitted, and physical channels carry payload data and define signal characteristics. There are three types of channels - logical, transport, and physical - that work together to transmit various types of control and traffic data between the UE and base station.
Three UEs (UE-A, UE-B, UE-C) initiate the random access procedure at the same time to connect to the eNodeB. UE-A and UE-B select the same preamble, resulting in a collision. UE-C selects a different preamble. The eNodeB responds to the preambles, assigning resources to UE-A and UE-C. During contention resolution, UE-A's connection request is acknowledged, while UE-B's collides and fails. UE-B then retries the random access procedure with a new preamble.
This document provides an overview of the BICC protocol and application in R4 networks. It discusses BICC protocol structure and message introduction, signaling flows including examples of call setup with forward and backward bearer establishment. It also covers topics like BICC protocol model, message structure, blocking and unblocking of call instances, main BICC messages, tunnel bearer setup, codec negotiation and call release scenarios. Signaling flows and examples are provided to illustrate different call setup scenarios.
This document provides an overview of the LTE radio layer 2, radio resource control (RRC), and radio access network architecture. It discusses the E-UTRAN architecture including eNodeBs, home eNodeBs, and relays. It describes the user plane including bearer services, the user plane protocol stack with PDCP, RLC, and MAC layers, and security and transport functions. It also outlines the control plane including connection control and RRC states, and highlights features like interoperability, self-organizing networks, positioning, broadcasting, latency evaluations, and LTE-Advanced.
The document discusses the SIGTRAN protocol stack and its components SCTP and M3UA. It provides an overview of these protocols, including their objectives, features, message structures, and functions in transferring SS7 signaling over IP networks. Key concepts discussed include SIGTRAN layers, SCTP transmission addressing, association establishment and termination, and M3UA routing, entities, and message transfer procedures.
There are three categories of channels in 3G LTE - physical, transport, and logical channels. Physical channels carry user data and control messages over the transmission medium. Transport channels offer information transfer between the physical layer and higher layers. Logical channels provide services to the MAC layer and carry different types of control and traffic data.
This document provides an introduction to LTE/E-UTRA technology, including both FDD and TDD modes of operation. It describes the key requirements for UMTS Long Term Evolution such as high data rates, low latency, and improved spectrum efficiency compared to previous standards. The document then covers various aspects of the LTE standard, including the OFDMA downlink and SC-FDMA uplink transmission schemes, MIMO concepts, protocol architecture, UE capabilities, and testing considerations. Abbreviations used and additional references are also provided.
This document discusses the Packet Data Convergence Protocol (PDCP) sublayer in 3GPP LTE networks. It describes the key functions of PDCP including header compression, ciphering, integrity protection, and transmission of user and control plane data. It also explains PDCP's use of ROHC for header compression and the various PDCP protocol data unit formats used for control and user plane messages.
TTI bundling is a technique used in LTE to improve uplink coverage for voice calls by transmitting the same transport block containing voice data over multiple consecutive subframes without waiting for HARQ feedback. This provides a coding gain of up to 4dB compared to single subframe transmission, allowing power-limited UEs at the cell edge to be received with sufficient quality. TTI bundling can be implemented in both FDD and TDD LTE networks but with some differences due to limitations on consecutive uplink subframes in TDD configurations. It provides lower latency voice transmission compared to alternatives like RLC segmentation while reducing overhead.
The document provides an overview of Next Generation Synchronous Digital Hierarchy (NG-SDH) which brings together SONET/SDH and Ethernet networks. It discusses how virtual concatenation allows efficient transport of Ethernet and other services over SDH networks by virtually concatenating payloads across multiple containers. Sequence indicators and frame counters are used to distinguish and maintain timing between virtually concatenated members. This overcomes issues with inefficient contiguous concatenation and fixed payload sizes in traditional SDH.
This document provides an overview of two fundamental mechanisms in LTE access networks: random access and buffer status reporting. It describes the random access procedure used by UEs to connect to the network, including the exchange of preambles, responses, and temporary identifiers. It also explains the buffer status reporting procedure, where UEs indicate to the base station the amount of data waiting to be transmitted so that uplink resources can be allocated. Key parameters for both mechanisms are defined in 3GPP specifications to optimize performance and control signaling in the network.
Carrier aggregation has evolved in HSPA through 3GPP releases to increase peak data rates and network capacity. Release 8 introduced dual-carrier HSDPA using two adjacent 5 MHz carriers. Release 9 specified dual-band operation using separate frequency bands and dual-carrier HSUPA. Release 10 supported four-carrier HSDPA across two frequency bands, doubling peak rates to 168 Mbps. Release 11 allows for up to 8 aggregated carriers of 5 MHz each for a maximum of 40 MHz total bandwidth and peak rates over 300 Mbps. Carrier aggregation significantly increases HSPA throughput with each new release.
This document outlines the 3GPP specifications process for developing new mobile network systems and features. It follows a three stage process:
Stage 1 defines service requirements. Stage 2 defines the network architecture, elements, and high-level flows. Stage 3 defines protocols, state machines, and messages.
This process was applied to developing LTE, where Stage 1 documents defined requirements like throughput rates and latency. Stage 2 documents described the overall LTE system architecture. Numerous Stage 3 specifications then defined the protocols that enable LTE.
The document summarizes the results of an email discussion on modifying RRC procedures in TS 25.331. It lists various RRC procedure specifications that were discussed and agreed upon. It is proposed to replace the text in chapters 8 and 9 of TS 25.331 with the text from this document, except for two procedures still being specified. The chapter structures would also be adjusted accordingly.
The document discusses LTE system signaling procedures. It begins with objectives of understanding LTE architecture, elementary procedures of interfaces like S1, X2 and Uu, and procedures for service setup, release and handover. It then covers topics like system architecture, bearer service architecture, elementary procedures on Uu including connection establishment and release, and procedures on S1 and X2 interfaces. The document aims to help readers understand LTE signaling flows and procedures.
The document describes the different states in UTRA RRC connected mode, including Cell_DCH, Cell_FACH, Cell_PCH, and URA_PCH states. It provides details on the Cell_DCH state, including how a UE can enter Cell_DCH state, internal procedures that can be performed in Cell_DCH state without state transitions, and triggers for transitions from Cell_DCH state to other states like Cell_FACH. Timers are defined for supervising RB and SRB activity and inactivity detection in Cell_DCH state.
Carrier aggregation is a technique used in LTE-Advanced to bond together multiple component carriers to increase overall transmission bandwidth beyond 20MHz and achieve higher data rates up to 1Gbps. It allows aggregation of up to 5 carriers that may be contiguous or non-contiguous in the same or different bands. The component carriers can have varying bandwidths from 1.4MHz to 20MHz. Carrier aggregation provides flexibility to efficiently use fragmented spectrum and achieve very high throughput using wider transmission bandwidths. It requires changes to the physical, MAC and RRC layers for proper operation across multiple carriers.
Synchronization is important in telecommunication networks to avoid data errors. All node clocks must be synchronized to the master clock to minimize errors. The TimeSource 3600 GPS receiver provides precise timing synchronization at the picosecond level for telecom networks. It can be monitored using TimeScan Craft and TimeScan NMS software to ensure the network maintains precise synchronization.
The document describes CSFB (CS fallback) and SMSoSGs (SMS over SGs) procedures in EPS. It discusses:
1. The protocol stack used on the SGs interface between MME and MSC, including SGsAP over SCTP.
2. Key SGs procedures like location update and detach to coordinate EPS and CS domain location information between MME and VLR.
3. How the MME allocates TAIs and LAIs to help optimize CSFB handovers between E-UTRAN and GERAN/UTRAN.
The 3GPP evolution for the 3G mobile system created the new base station system, called Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) and a new core network, called Evolved Packet Core (EPC) as a result of two standardisation projects: Long Term Evolution (LTE) and System Architecture Evolution (SAE). Under these specifications a mobile phone gets access to higher bandwidth with low latency in an improved and more efficient network architecture. The standards define an all-IP network as a base for the E-UTRAN/EPC. The E-UTRAN/EPC does not have a separate PS data traffic and CS voice network, both communicate over the same new Evolved Packet System (EPS) network. LTE/EPS Technology course is an intermediate technical course, which covers all aspects of architecture and functionality of the EPS.
“Signalling in GSM BSS” course focuses on signalling between GSM nodes within Base Station
System (BSS). During the course all protocols and signalling procedures on all interfaces within BSS
are presented in details. The organisation of channels of air interface and cell parameters is also
widely covered in the course. The course also describes parts of the Signalling System No. 7 that are
relevant for BSS and presents co-operation between Core Network and BSS during procedures like
call set-up and location update.
Unlike previous 3GPP wireless technologies, LTE has no Circuit Switched (CS) bearer to support voice, so carrying voice over LTE requires a migration to a Voice over IP (VoIP) solution. Until this migration occurs, LTE-capable handsets need to revert to 2G or 3G for voice calls, which can reduce quality or even suspend Packed Switched (PS) services. The GSMA's IP Multimedia Subsystem (IMS) Profile for Voice and SMS document, commonly referenced as Voice over LTE (VoLTE), defines the mandatory set of features that the mobile device and network are required to implement in order to guarantee an interoperable, high quality IMS-based telephony service over LTE. The course focuses on VoLTE services, underpaying IMS architecture, basic procedures and their impact on existing operator infrastructure. The intermediate solutions like CSFB and SMSoSGs are also explained as they can be used concurrently with VoLTE to support roaming subscribers and emergency calls as long as the operator is not ready to move those service to VoLTE.
“Signalling in GSM BSS” course focuses on signalling between GSM nodes within Base Station
System (BSS). During the course all protocols and signalling procedures on all interfaces within BSS
are presented in details. The organisation of channels of air interface and cell parameters is also
widely covered in the course. The course also describes parts of the Signalling System No. 7 that are
relevant for BSS and presents co-operation between Core Network and BSS during procedures like
call set-up and location update.
For a long time, IP Multimedia Subsystem (IMS) was nothing more than just a revolutionary idea to move all existing teleservices, including telephony to the PS domain of the mobile network and to create a vast variety of brand new teleservices totally based on end-to-end IP connectivity. Today, thanks to Rich Communication Suite-enhanced (RCS-e) initiative, there is a clear path and agreement on how to turn IMS into practice. RCS-e ensures that the same initial subset of IMS services will be introduced by all operators, infrastructure and terminal vendors and will work smoothly also in inter-operator scenarios. The course explains RCS-e services, underpaying IMS architecture and basic procedures and their impact on existing operator infrastructure.
The GSM/UMTS/LTE Basics course presents in a concise form all the issues connected with modern cellular network, where GSM including GPRS/EDGE and UMTS including HSDPA/HSUPA services are commonly used and implementation of LTE together with IMS is a challenge of the following years.
During the training, all the radio access technologies i.e. GSM, UMTS and LTE and all types of services i.e. traditional telephony, packet transmission and IMS services are presented with the equal stress, since in the modern cellular network, all of them are run or will be run simultaneously in the near future.
Instead of presenting the topics in the traditional form, describing one technology after another, this course rather concentrates on common radio and network problems and on how this common problems are solved by GSM, UMTS and LTE, Thanks to, such form of the training, it becomes clear for the participants, that within 3GPP, there are no technologies that are fundamentally better or worsen then the others; each of them is optimized towards a certain environments and services; and all of them interwork with each other, creating one common, constantly evolving network.
With the GSM/UMTS/LTE Basics course participants may begin their cellular network education. Further, there are more advanced courses, which present aspects of GSM, UMTS and LTE technologies in greater detail.
Policy and charging_control_chapter_02_architecture_evolutionLeliwa
The document summarizes the evolution of the PCC (Policy and Charging Control) architecture from releases R7 to R8 to R10 and R11 of 3GPP specifications. In R7, the PCC architecture consisted of PCRF, PCEF, AF, OCS, OFCS and SPR connected by Rx, Gx, Sp, Gy, and Gz reference points. In R8, the introduction of EPS led to adding a BBERF in the S-GW and a Gxx reference point between PCRF and BBERF. R10 and R11 added additional reference points to support new functions.
For a long time, IP Multimedia Subsystem (IMS) was nothing more than just a revolutionary idea to move all existing teleservices, including telephony to the PS domain of the mobile network and to create a vast variety of brand new teleservices totally based on end-to-end IP connectivity. Today, thanks to GSMA Rich Communication Suite (RCS) initiative, there is a clear path and agreement on how to turn IMS into practice. RCS ensures that the same initial subset of IMS services will be introduced by all operators, infrastructure and terminal vendors and will work smoothly also in inter-operator scenarios. The course explains IMS architecture, addressing, intra- and inter-operator signalling procedures, paying a special attention to the non-voice services selected by the GSMA for RCS-e and RCS5.
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
The document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It first describes cognitive radio networks and their ability to dynamically access unused radio spectrum. It then summarizes the characteristics of reactive, proactive, and hybrid routing protocols. Reactive protocols determine routes on demand through flooding, while proactive protocols constantly update routing tables. The document analyzes the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR) reactive protocols as well as the destination sequenced distance vector (DSDV) and optimized link state (OLSR) proactive protocols. It aims to compare these protocols and determine the most energy efficient for the cognitive radio network model.
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
This document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It analyzes reactive, proactive, and hybrid routing protocols including AODV, DSR, DSDV, OLSR, and a hybrid protocol. Simulation results show the hybrid protocol consumes the least energy compared to other protocols, making it well-suited for an energy efficient cognitive radio network model.
IP Infusion Application Note for 4G LTE Fixed Wireless AccessDhiman Chowdhury
SKY Brazil is one of the largest Pay TV provider in Brazil with 5Million+ subscribers created world’s first disaggregated 5G-ready Fixed Wireless Access (FWA) network using IPInfusion’s disaggregated Cell Site Gateway Solution to serve 35K broadband subscribers.
Learn how the deployment was done, read this application note to know more about the usecase and OcNOS configurations.
RAN - Intro, I&C & Basic Troubleshooting (3).pptxFelix Franco
The document discusses the evolution of mobile networks from 3G to 4G and 5G, including an overview of 4G LTE and 5G NSA architectures. It then outlines 4 deployment scenarios for a SKY network modernization project involving replacing 3G nodes with 4G and 5G nodes at existing sites, adding new 4G-only outdoor sites, and providing indoor 4G coverage. Product descriptions are provided for the Ericsson baseband 6630 and RAN processor 6337 for 4G/5G deployment.
The document discusses the evolution of mobile networks from 3G to 4G and 5G, and provides an overview of SKY Network's plan to modernize its radio access network (RAN). The modernization will involve deploying 4G and 5G radio nodes across different scenarios, including replacing existing 3G nodes with 4G/5G, deploying new 4G-only nodes, and using indoor small cells. The interfaces, architectures and equipment involved are also described at a high level.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
ER Publication,
IJETR, IJMCTR,
Journals,
International Journals,
High Impact Journals,
Monthly Journal,
Good quality Journals,
Research,
Research Papers,
Research Article,
Free Journals, Open access Journals,
erpublication.org,
Engineering Journal,
Science Journals,
Some of the key driving forces behind the transition from the UMTS based cellular system to the Long Term Evolution Advanced (LTE-A) are to improve the mean and the cell-edge throughput, improve the user fairness, and improve the quality of service (QoS) satisfaction for all users. In the latter system, relays appear as one of the most prominent enabler for improving the cell-edge user experience while increasing the system’s fairness.
In this white paper, we present the basics of relay deployments in LTE-A networks. Moreover, we analyze resource allocation problem for Relay Nodes (RN) deployments and present some of the solutions for improvement in system resource usage and QoS satisfaction. Afterwards, we introduce the capabilities of NOMOR’s LTE-A system level simulator and evaluate the performance of LTE-A relay systems under the described solutions.
IRJET- Modified SIMPLE Protocol for Wireless Body Area NetworksIRJET Journal
This document proposes modifications to the SIMPLE routing protocol to improve its performance in wireless body area networks (WBANs). It first describes the SIMPLE protocol and its operation. It then proposes a modified forwarding function that selects the next hop node based on residual energy and distance to the sink node. Simulation results show that the proposed modifications improve throughput and energy efficiency compared to the original SIMPLE protocol, with fewer packet drops and dead nodes, higher packet delivery to the sink, and better residual energy levels over time.
5G PRACH Document-KPIs Improvemnt and understandingQasimQadir3
The document discusses 5G/NR random access channel (RACH) and preamble random access channel (PRACH). It provides the following key points:
1. RACH is used to achieve uplink synchronization between the UE and gNB and obtain resources for Message 3 transmission.
2. PRACH specifically carries the preamble from the UE for uplink synchronization. There are 13 supported preamble formats in 5G/NR with different sequence lengths and time/frequency characteristics.
3. The time-frequency position of the PRACH is determined by factors like frame number, subframe, slot, and occasion number. Zadoff-Chu sequences are used to generate the preambles with parameters like root sequence
1. The document discusses LTE PDCCH optimization techniques, including assigning UEs unique C-RNTIs after initial connection to identify PDCCH messages, using the PDCCH as a pointer to PDSCH resource allocations, and different PDCCH aggregation levels used based on radio conditions.
2. It describes PDCCH settings like the number of symbols used, maximum CCEs per frame, thresholds for CCE allocation, and adjusting the aggregation level based on coding rate or BLER.
3. counters and features are discussed for monitoring PDCCH and CCE usage, as well as techniques for improving PDCCH capacity like increasing transmit power or reducing the aggregation level.
The International Journal of Engineering and Science (The IJES)theijes
This document summarizes a research paper that reviews techniques for optimal design and placement of pilot symbols for channel estimation in OFDM systems operating under rapidly time-varying channels. It discusses how particle swarm optimization, the Cramér–Rao Bound, and Bayesian Cramér–Rao Bound techniques are commonly used to optimize pilot sequence design to improve channel estimation performance and reduce intercarrier interference. Grouping pilot tones into clusters rather than evenly spacing each pilot tone can provide better channel estimation against doubly selective channels. The optimal clustered pilot sequence is derived using maximum likelihood estimation and is independent of signal-to-noise ratio or Doppler rate.
Mobile Ad hoc Networks (MANETs) are characterized by open structure, lack of standard infrastructure
and un-accessibility to the trusted servers. The performance of various MANET routing protocols is
significantly affected due to frequently changing network topology, confined network resources and
security of data packets. In this paper, a simulation based performance comparison of one of the most
commonly used on-demand application oriented routing protocols, AODV (Ad hoc on-demand Distance
Vector) and its optimized versions R-AODV (Reverse AODV) and PHR-AODV (Path hopping based
Reverse AODV) has been presented. Basically the paper evaluates these protocols based on a wide set of
performance metrics by varying both the number of nodes and the nodes maximum speed. A NS-2 based
simulation study shows that, as compared to AODV and PHR-AODV, R-AODV enhances the packet
delivery fraction by 15-20% and reduces the latency approximately by 50%. R-AODV requires lesser node
energy for data transmission.
Radio resource management and mobiltiy mngmntabidsyed4u
Radio resource management deals with managing interference, resources, and transmission characteristics in wireless networks. It involves issues around multi-user and multi-cell capacity. Connectivity is provided through bearer services architecture. Static radio resource management involves fixed cell planning including frequency allocation, base station placement, and parameters. Dynamic RRM adapts to traffic load, user positions, mobility, and quality of service using techniques like power control, channel allocation, and handover criteria. Mobility management is handled by the mobility management entity which tracks user location as users move between tracking areas.
NetSim Long Term Evolution (LTE) Networks library includes LTE/LTE-A networks, LTE
Femto Cell, LTE D2D and LTE VANET. The LTE libraray allows you to connect, if required,
with Internetwork devices such as Routers, Switches etc running Ethernet, Wireless LAN, IP
Routing, TCP / UDP.
This white paper discusses protocol signaling procedures in LTE networks, including:
1) The LTE network architecture includes eNodeBs, MMEs, SGWs, and PGWs that facilitate communication between UEs and the core network.
2) UEs access the network through random access procedures and establish default bearers for connectivity.
3) System information broadcasting allows UEs to select networks and camp on cells, while tracking area updates allow UEs to update their locations.
4) Attach procedures register UEs on the network and allocate IP addresses, while detach procedures deregister UEs when no longer requiring service.
This document proposes and analyzes two new C-RAN network architectures that utilize SDN and centralized baseband processing. The first architecture (D-MME-CRAN) distributes the mobility management entity (MME) function within each C-RAN, while the second (C-MME-CRAN) centralizes the MME. Both architectures are evaluated based on control signaling load across five procedures when varying cell area and tracking area size. Results show the D-MME-CRAN performs best for small tracking areas, while C-MME-CRAN is better for larger areas. Overall, the proposed architectures reduce signaling load compared to legacy networks and other SDN-based approaches.
Umts network protocols and complete call flowssivakumar D
This document provides an overview of the network architecture and signalling protocols in UMTS networks. It describes the main network elements of UTRAN, UE and CN. It explains the interfaces between these elements and the protocols used for communication, including RRC for UE-RNC signalling, RANAP for RNC-CN signalling, and NAS protocols for non-access signalling between UE and CN. It also summarizes the protocol stacks used over the Iu interfaces between RNC and CN for circuit-switched and packet-switched domains.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
3. 4 Relay
71
IntroductionIntroductionIntroductionIntroduction
[1, 3GPP 36.912] LTE-Advanced extends LTE R8 with support for relaying
as a tool to improve e.g. the coverage of high data rates, temporary network
deployment, the cell-edge throughput and/or to provide coverage in new
areas.
The Relay Node (RN) is wirelessly connected to a donor cell of a donor eNB
(DeNB) via the Un interface, and UEs connect to the RN via the Uu interface.
R8 UEs is able to connect to the donor cell as well as to the RN cell.
Figure 4-1 Relaying
With respect to the relay node’s usage of spectrum, its operation can be
classified into:
• Inband (RN Type 1), in which case the DeNB-RN link shares the
same carrier frequency with RN-UE links.
• Outband (RN Type 1a), in which case the DeNB-RN link does not
operate in the same carrier frequency as RN-UE links.
The RN is characterized by the following:
• It controls cells, each of which appears to a UE as a separate cell
distinct from the donor cell
• The cells have their own Physical Cell ID (PCI) and transmit their
own synchronisation channels, reference symbols, …
• In the context of single-cell operation, the UE receives scheduling
information and HARQ feedback directly from the RN and sends its
control channels (SR/CQI/ACK) to the RN.
• It appears as a R8 eNB to R8 UEs (i.e. is backwards compatible).
• To LTE-Advanced UEs, it is possible for a RN to appear differently
than R8 eNB to allow for further performance enhancement.
EPCUnUu S1RN
donor cell
R8+
R8+
DeNB
Uu
4. LTE-Advanced
72
Figure 4-2 Inband and outband relay
Via proper deploying of the relay, both the backhaul link and the access link
can be made with better propagation condition compared with the direct link,
and hence the end-to-end performance can be improved compared to the case
without relay.
[2, 3GPP 36.300] In R10 and R11 inter-cell handover of the RN is not
supported. A Study on Mobile Relay for E-UTRA is part of R12 [3, 3GPP
36.836].
An RN may not use another RN as its DeNB.
Figure 4-3 Relay limitations (R10, R11)
f4
f3
RN
RN
f2
f1f1
f2
f2
f1
Inband (type 1)
Outband (type 1a)
RNRN
RN
RN
inter-cell
HO
cascaded RNs
5. 4 Relay
73
ArchitectureArchitectureArchitectureArchitecture
[2, 3GPP 36.300] The architecture for supporting RNs is shown in Fig. 4-4.
The RN terminates the S1, X2 and Un interfaces. The DeNB provides S1 and
X2 proxy functionality between the RN and other network nodes (other eNBs,
MMEs and S GWs). The S1 and X2 proxy functionality includes passing
UE-dedicated S1 and X2 signalling messages as well as GTP data packets
between the S1 and X2 interfaces associated with the RN and the S1 and X2
interfaces associated with other network nodes. Due to the proxy
functionality, the DeNB appears as an MME (for S1-MME), an eNB (for X2)
and an S-GW (for S1-U) to the RN.
Figure 4-4 E-UTRAN architecture supporting RNs
In phase II of RN operation, the DeNB also embeds and provides the
S/P-GW-like functions needed for the RN operation. This includes creating a
session for the RN and managing EPS bearers for the RN, as well as
terminating the S11 interface towards the MME serving the RN.
The RN and DeNB also perform mapping of signalling and data packets onto
EPS bearers that are setup for the RN. The mapping is based on existing QoS
mechanisms defined for the UE and the P-GW.
In phase II of RN operation, the P-GW functions in the DeNB allocate an IP
address for the RN for the O&M which may be different than the S1 IP
address of the DeNB.
If the RN address is not routable to the RN O&M domain, it shall be
reachable from the RN O&M domain (e.g. via NAT).
S1
MME/S-GW MME/S-GW
RN
DeNBeNB
S11
S1
S1 S1
S11
X2
X2S1
Un
includes
S/P-GW
for the RN
6. LTE-Advanced
74
S1 and X2S1 and X2S1 and X2S1 and X2 UUUU----plane aspectsplane aspectsplane aspectsplane aspects
The S1 U-plane protocol stack for supporting RNs is shown in Fig. 4-5.
Figure 4-5 S1 U-plane protocol stack for supporting RNs
There is a GTP tunnel associated with each UE EPS bearer, spanning from the
S-GW associated with the UE to the DeNB, which is switched to another GTP
tunnel in the DeNB, going from the DeNB to the RN (one-to-one mapping).
Figure 4-6 S1 & S5/S8 GTP tunnels
The X2 U-plane protocol stack for supporting RNs is shown in Fig. 4-7.
Figure 4-7 X2 U-plane protocol stack for supporting RNs
GTP GTPGTP GTP
UDP UDP UDP UDP
IP IP IP IP
PDCP
RLC
MAC
PHY
PDCP
RLC
MAC
PHY
L2
L1
L2
L1
RN S1-U DeNB S1-U S-GW
S-GW P-GW
PDN
1:1
RN
GTP GTPGTP GTP
UDP UDP UDP UDP
IP IP IP IP
PDCP
RLC
MAC
PHY
PDCP
RLC
MAC
PHY
L2
L1
L2
L1
RN X2-U DeNB X2-U
eNB
(other)
7. 4 Relay
75
There is a GTP forwarding tunnel associated with each UE EPS bearer subject
to forwarding, spanning from the other eNB to the DeNB, which is switched
to another GTP tunnel in the DeNB, going from the DeNB to the RN (one-to-
one mapping).
Figure 4-8 X2 GTP tunnels
The S1 and X2 U-plane packets are mapped to Radio Bearers (RBs) over the
Un interface. The mapping can be based on the QCI associated with the UE
EPS bearers. UE EPS bearer with similar QoS can be mapped to the same Un
RB.
Figure 4-9 Mapping of S1/X2 U-plane packets to RB on Un interface
RN OAM provides the appropriate support to configure a QCI-to-DSCP
mapping function at the RN which is used to control the mapping in UL of Uu
bearer(s) of different QCI(s) to Un bearer(s).
S-GW
O&M
X2/S1control
RN
MME
O&M
QCI=x
QCI=y
QCI=y
8. LTE-Advanced
76
S1 and X2S1 and X2S1 and X2S1 and X2 CCCC----plane aspectsplane aspectsplane aspectsplane aspects
The S1 C-plane protocol stack for supporting RNs is shown in Fig. 4-10.
Figure 4-10 S1 C-plane protocol stack for supporting RNs
There is a single S1 interface relation between each RN and its DeNB, and
there is one S1 interface relation between the DeNB and each MME in the
MME pool. The DeNB processes and forwards all S1 messages between the
RN and the MMEs for all UE-dedicated procedures.
Figure 4-11 S1AP message processing at DeNB (UE dedicated)
The processing of S1AP messages includes modifying S1AP UE IDs,
Transport Layer address and GTP TEIDs but leaves other parts of the
message unchanged.
S1AP S1APS1AP S1AP
SCTP SCTP SCTP SCTP
IP IP IP IP
PDCP
RLC
MAC
PHY
PDCP
RLC
MAC
PHY
L2
L1
L2
L1
RN S1-MME DeNB S1-MME MME
S1AP message
RN MME
S1AP message
DeNB
MME UE S1AP ID, eNB UE S1AP ID,
Transport Layer Address, GTP-TEID
(…)
S1 S1
MME UE S1AP ID, eNB UE S1AP ID,
Transport Layer Address, GTP-TEID
(…)
1:1 mapping
transparent
9. 4 Relay
77
Figure 4-12 S1AP message processing at eNB (non-UE dedicated)
All non-UE-dedicated S1AP procedures are terminated at the DeNB, and
handled locally between the RN and the DeNB, and between the DeNB and
the MME(s). Upon reception of an S1 non-UE-dedicated message from an
MME, the DeNB may trigger corresponding S1 non-UE-dedicated
procedure(s) to the RN(s). If more than one RN is involved, the DeNB may
wait and aggregate the response messages from all involved RNs before
responding to the MME. Upon reception of an S1 non-UE-dedicated message
from an RN, the DeNB may trigger associated S1 non-UE-dedicated
procedure(s) to the MME(s). Upon reception of a S1AP PAGING message,
the DeNB sends the S1AP PAGING message toward the RN(s) which support
any TA(s) indicated in the list of TAIs. Upon reception of an S1 MME
overload message, the DeNB sends the MME overload message towards the
RN(s), including in the message the identities of the affected CN node. Upon
reception of the GUMMEI from a UE, the RN shall include it in the INITIAL
UE MESSAGE message; upon reception of the GUMMEI Type from the UE,
the RN shall also include it in the message.
The X2 C-plane protocol stack for supporting RNs is shown in Fig. 4-13.
Figure 4-13 X2 C-plane protocol stack for supporting RNs
There is a single X2 interface relation between each RN and its DeNB. In
addition, the DeNB may have X2 interface relations to neighbouring eNBs.
MME
DeNB
MME
RN
MME
DeNB
MME
RN
RN
RN
X2AP X2APX2AP X2AP
SCTP SCTP SCTP SCTP
IP IP IP IP
PDCP
RLC
MAC
PHY
PDCP
RLC
MAC
PHY
L2
L1
L2
L1
RN X2-C DeNB X2-C MME
10. LTE-Advanced
78
The DeNB processes and forwards all X2 messages between the RN and other
eNBs for all UE-dedicated procedures. The processing of X2-AP messages
includes modifying S1/X2-AP UE IDs, Transport Layer address and GTP
TEIDs but leaves other parts of the message unchanged.
Figure 4-14 X2AP message processing at DeNB (UE dedicated)
All non-UE-dedicated X2-AP procedures are terminated at the DeNB, and
handled locally between the RN and the DeNB, and between the DeNB and
other eNBs. Upon reception of an X2 non-cell related non-UE-associated
message from RN or neighbour eNB, the DeNB may trigger associated
non-UE-dedicated X2-AP procedure(s) to the neighbour eNB or RN(s). Upon
reception of an X2 cell related non-UE-dedicated message from RN or
neighbour eNB, the DeNB may pass associated information to the neighbour
eNB or RN(s) based on the included cell information. If one or more RN(s)
are involved, the DeNB may wait and aggregate the response messages from
all involved nodes to respond to the originating node. Further, parallel Cell
Activation procedures are not allowed on each X2 interface instance. The
processing of Resource Status Reporting Initiation/ Resource Status Reporting
messages includes modification of measurement ID.
Figure 4-15 X2AP message processing at DeNB (non-UE dedicated)
The S1 and X2 interface signalling packets are mapped to RBs over the Un
interface (see Fig. 4-9).
X2AP message
RN
X2AP message
DeNB
Old eNB UE X2AP ID,
New eNB UE X2AP ID,
Transport Layer Address, GTP-TEID
(…)
X2 X2
Old eNB UE X2AP ID,
New eNB UE X2AP ID,
Transport Layer Address, GTP-TEID
(…)
1:1 mapping
transparent
eNB
RN
DeNBRN
eNB
eNB
11. 4 Relay
79
Radio protocol aspectsRadio protocol aspectsRadio protocol aspectsRadio protocol aspects
The RN connects to the DeNB via the Un interface using the same radio
protocols and procedures as a UE connecting to an eNB. The C-plane protocol
stack is shown in Fig. 4-16 and the U-plane protocol stack is shown in
Fig. 4-17.
The following relay-specific functionalities are supported:
• the RRC layer of the Un interface has functionality to configure and
reconfigure an RN subframe configuration through the RN
reconfiguration procedure (e.g. DL subframe configuration and an
RN-specific control channel) for transmissions between an RN and a
DeNB. The RN may request such a configuration from the DeNB
during the RRC connection establishment, and the DeNB may initiate
the RRC signalling for such configuration;
• the RRC layer of the Un interface has functionality to send updated
system information in a dedicated message to an RN with an RN
subframe configuration. The RN applies the received system
information immediately;
• the PDCP layer of the Un interface has functionality to provide
integrity protection for the U-plane. The integrity protection is
configured per DRB.
To support PWS towards UEs, the RN receives the relevant information over
S1. The RN should hence ignore DeNB system information relating to PWS.
Figure 4-16 Un C-plane protocol stack for supporting RNs
NAS NAS
RRC RRC
PDCP PDCP
RLC RLC
MAC MAC
PHY PHY
RN Un DeNB MME
12. LTE-Advanced
80
Figure 4-17 Un U-plane protocol stack for supporting RNs
Signalling proceduresSignalling proceduresSignalling proceduresSignalling procedures
RN startRN startRN startRN start----up procedureup procedureup procedureup procedure
Fig. 4-18 and Fig. 4-19 shows a simplified version of the start-up procedure
for the RN. The procedure is based on the normal UE attach procedure and it
consists of the following two phases:
Phase I:Phase I:Phase I:Phase I: Attach for RN preconfigurationAttach for RN preconfigurationAttach for RN preconfigurationAttach for RN preconfiguration
The RN attaches to the E-UTRAN/EPC as a UE at power-up and retrieves
initial configuration parameters, including the list of DeNB cells, from RN
OAM. After this operation is complete, the RN detaches from the network as
a UE and triggers Phase II. The MME performs the S-GW and P-GW
selection for the RN as a normal UE.
Figure 4-18 RN start-up procedure (phase 1)
PDCP PDCP
RLC RLC
MAC MAC
PHY PHY
RN Un DeNB
13. 4 Relay
81
PhPhPhPhase II: Attachase II: Attachase II: Attachase II: Attach for RN operationfor RN operationfor RN operationfor RN operation
The RN connects to a DeNB selected from the list acquired during Phase I to
start relay operations. For this purpose, the normal RN attach procedure
described earlier. After the DeNB initiates setup of bearer for S1/X2, the RN
initiates the setup of S1 and X2 associations with the DeNB. In addition, the
DeNB may initiate an RN reconfiguration procedure via RRC signalling for
RN-specific parameters.
After the S1 setup, the DeNB performs the S1 eNB Configuration Update
procedure(s), if the configuration data for the DeNB is updated due to the RN
attach. After the X2 setup, the DeNB performs the X2 eNB Configuration
Update procedure(s) to update the cell information.
In this phase the RN cells’ ECGIs are configured by RN OAM.
Figure 4-19 RN start-up procedure (phase 2)
RN attach procedureRN attach procedureRN attach procedureRN attach procedure
Fig. 4-20 shows a simplified version of the attach procedure for the RN. The
procedure is the same as the normal UE attach procedure with the exception
that:
• The DeNB has been made aware of which MMEs support RN
functionality via the S1AP SETUP RESPONSE message earlier
received from the MMEs;
14. LTE-Advanced
82
• The RN sends an RN indication to the DeNB during RRC connection
establishment (rn-SubframeConfigReq parameter in RRC
CONNECTION COMPLETE message [4, 3GPP 36.331]);
• After receiving the RN indication from the RN, the DeNB sends the
RN indicator and the IP address of the S-GW/P-GW function
embedded in the DeNB, within the S1AP INITIAL UE MESSAGE
message, to an MME supporting RN functionality;
• MME selects S-GW/P-GW for the RN based on the IP address
included in the S1AP INITIAL UE MESSAGE message;
• During the attach procedure, the EPC checks if the RN is authorised
for relay operation; only if the RN is authorised, the EPC accepts the
attach and sets up a context with the DeNB; otherwise the EPC rejects
the attach.
The RN is preconfigured with information about which cells (DeNBs) it is
allowed to access.
Figure 4-20 RN attach procedure
EEEE----RAB activation/modificationRAB activation/modificationRAB activation/modificationRAB activation/modification
Fig. 4-21 shows a simplified version of the DeNB-initiated bearer
activation/modification procedure. This procedure can be used by the DeNB
to change the EPS bearer allocation for the RN. The procedure is the same as
the normal network-initiated bearer activation/modification procedure with
the exception that the S/P-GW functionality is performed by the DeNB.
RN MMERN
DeNB
HSS
RRC connection setup
NAS Attach, Authentication, Security Authentication, Security
GTP-C Create Session
S1AP Context Setup
(NAS Attach Accept)
RRC connection
reconfiguration
Includes S/P-GW
for the RN
15. 4 Relay
83
Figure 4-21 DeNB-initiated bearer activation/modification procedure
RN reconfigurationRN reconfigurationRN reconfigurationRN reconfiguration
The purpose of this procedure is to configure/reconfigure the RN subframe
configuration and/or to update the system information relevant for the RN in
RRC CONNECTED state.
Figure 4-22 RN reconfiguration
E-UTRAN may initiate the RN reconfiguration procedure to an RN in RRC
CONNECTED when AS security has been activated.
RRC Connection Reconfiguration
(NAS SM message)
GTP-C Create/Update Bearer Req.
S1AP E-RAB Setup/Modification Req.
(NAS SM message)
S1AP E-RAB Setup/Modification Rsp.
UL Information Transfer
(NAS SM message)
UL NAS Transport
(NAS SM message)
GTP-C Create/Update Bearer Rsp.
RN MMERN
DeNB
Includes S/P-GW
for the RN
rn-SubframeConfigReq
rn-SystemInfo (SystemInformationBlockType1 / 2),
rn-SubframeConfig (subframeConfigPatternFDD / TDD,
rpdcch-Config (resourceAllocationType, resourceBlockAssignment),
demodulationRS, pdsch-Start, pucch-Config)
RRC RN Reconfiguration Complete
RRC RN Reconfiguration
RRC Connection Request
RRC Connection Setup
RRC Connection Complete
DeNB
RN
16. LTE-Advanced
84
OAMOAMOAMOAM
Each RN sends alarms and traffic counter information to its OAM system,
from which it receives commands, configuration data and software downloads
(e.g. for equipment software upgrades). This transport connection between
each RN and its OAM, using IP, is provided by the DeNB.
Figure 4-23 RN OAM architecture
RN OAM traffic is transported over the Un interface, and it shares resources
with the rest of the traffic, including UEs attached to the DeNB. The secure
connection between the RN and its OAM may be direct or hop-by-hop, i.e.
involving intermediate hops trusted by the operator for this purpose.
OAM Traffic QoS RequirementsOAM Traffic QoS RequirementsOAM Traffic QoS RequirementsOAM Traffic QoS Requirements
Alarms in the RN generate bursts of high-priority traffic, to be transported in
real time. Traffic counters generate bursts of traffic, but their transport need
not be real-time. Configuration messages from OAM to the RN will also
generate small bursts of traffic, possibly with lower priority than alarms but
still delay-sensitive: when a configuration is committed on the OAM, the time
interval between the commitment and the effect on the equipment shall be
small.
Alarm messages and commands should be transported on a high-priority
bearer, while counters may be transported on a lower priority bearer. There is
no need to specify a new QCI value other than those already standardised.
Alarm messages and commands may be mapped over a dedicated bearer or
over the same bearer that carries S1 and/or X2 messages between the RN and
the DeNB.
OAM software download to the RN may generate larger amounts of data, but
both the required data rate and the priority of this kind of traffic are much
lower than in the case of alarms, commands and counters. OAM software
downloads may be mapped to a dedicated, non-GBR bearer, or transported
together with the user plane traffic.
S/P-GWRN
RN OAM
Un
DeNB
secure connection
17. 4 Relay
85
Physical layerPhysical layerPhysical layerPhysical layer
[5, 3GPP 36.216] From a UE perspective a RN is part of the RAN and
behaves like an eNB. A RN is wirelessly connected to a DeNB.
A RN includes at least two physical layer entities. One entity is used for
communication with UEs. Another physical layer entity is used for
communication with the DeNB.
In case of inband (type 1) relay, time-frequency resources shall be set aside
for DeNB-RN transmissions by time multiplexing DeNB-RN and RN-UE
transmissions. Subframes during which DeNB-RN transmission may take
place are configured by higher layers (RRC). DL subframes configured for
DeNB-to-RN transmission shall be configured as MBSFN subframes by the
RN (RRC SIB2 MBSFN-SubframeConfig parameter) and accept the 1 or 2
OFDM symbol long control region of the subframe, shall not be transmitted
by the RN.
Figure 4-24 Uu/Un time multiplexing (inband relay)
For frame structure type 1, DeNB-to-RN and RN-to-UE transmissions occur
in the DL frequency band, while RN-to-DeNB and UE-to-RN transmissions
occur in the UL frequency band.
For frame structure type 1 (i.e. for FDD), a subframes configured for
DeNB-to-RN transmission are given by the SubframeConfigurationFDD
parameter send by the DeNB to RN as a part of the RRC RN Reconfiguration
procedure. A subframe n is configured for RN-to-DeNB transmission if
subframe n-4 is configured for DeNB-to-RN transmission. If the RN requires
this subframe to be idle from UE-to-RN transmission, the RN does not
allocate any PDSCH or PUCCH resources on that subframe.
RN
f2
f1 f1
f2
TDM
TDM
18. LTE-Advanced
86
The subframes number 0, 4, 5, 9 that due to collision with PSS, SSS,
PBCH/BCH and/or PCH cannot be configured by RN-to-UE as MBSFN
subframes, also cannot be configured for DeNB-to-RN.
Figure 4-25 SubframeConfigurationFDD = 01010101 (example)
For frame structure type 2 (i.e. TDD) the subframes that can be configured for
DeNB-RN transmission are listed in Fig. 4-26 where, for each subframe in a
radio frame, “D” denotes the subframe is configured for DL DeNB-to-RN
transmissions, “U” denotes the subframe is configured for UL RN-to-DeNB
transmissions. The parameter SubframeConfigurationTDD is configured by
higher layers (RRC).
Figure 4-26 Supported configurations for DeNB-RN transmission (TDD)
radio frame radio frame
4 ms
“false” MBSFN subframe
DeNB-to-RN
RN-to-UE
RN-to-DeNB
UE-to-RN
Subframe
Configuration
TDD
eNB-RN
UL-DL
configuration
Subframe number n
0 1 2 3 4 5 6 7 8 9
0
1
d s u u D d s u U d
1 d s u U d d s u u D
2 d s u u D d s u U D
3 d s u U D d s u u D
4 d s u U D d s u U D
5
2
d s U d d d s u D d
6 d s u D d d s U d d
7 d s U d D d s u D d
8 d s u D d d s U d D
9 d s U D D d s u D d
10 d s u D d d d U D D
11
3
d s u U u d d D d D
12 d s u U u d d D D D
13
4
d s u U d d d d d D
14 d s u U d d d D d D
15 d s u U d d d d D D
16 d s u U d d d D D D
17 d s u U D d d D D D
18 6 d s u u U d s u u D
19. 4 Relay
87
DeNB-to-RN transmissions is restricted to a subset of the OFDM symbols in
a slot. The starting OFDM symbol in the first slot of the subframe is given by
the parameter DL-StartSymbol (symbol number 1 ,2 or 3) configured by
higher layers (RRC). If DL subframes are transmitted with time aligned
subframe boundaries by the DeNB and the RN, the ending OFDMA symbol
in the second slot of the subframe is symbol number 6, and symbol number 5
otherwise.
Figure 4-27 DeNB-to-RN transmission (OFDMA symbols)
RRRR----PDCCHPDCCHPDCCHPDCCH
The Relay Physical Downlink Control Channel (R-PDCCH) carries DCI for
RNs to dynamically assign resources to different RNs within the semi-
statically assigned sub-frames for DeNB-RN and RN-DeNB PDSCH
transmission. An R-PDCCH is transmitted starting from OFDMA symbol 3 of
the first slot of the subframe up to OFDMA symbol 6 ( if DL subframes are
transmitted with time aligned subframe boundaries by the DeNB and the RN)
or 51.
In the frequency domain, a set of VRBs is configured for potential
R-PDCCH transmission by higher layers (RRC) using resource allocation
types 0, 1, or 2.
An R-PDCCH can be transmitted on one or several PRBs without being
cross-interleaved with other R-PDCCHs. Alternatively, multiple R-PDCCHs
can be cross-interleaved in one or several PRBs.
1 This new channel type is needed because the RN may miss the first part of the subframe where PDCCH is
transmitted as the RN is still transmitting the PDCCH of the MBSFN subframe to its UEs.
DeNB DL
x
RN DL
x x x x x x x x x x x x x
RN
DL-StartSymbol (1, 2, 3) 0 or 1
“false” MBSFN subframe
20. LTE-Advanced
88
Figure 4-28 R-PDCCH and PDSCH
The RN shall monitor the set of configured VRBs in the first slot for an
R-PDCCH containing a DL assignment and it shall monitor the set of
configured VRBs in the second slot for an R-PDCCH containing an UL grant.
If the RN receives a resource allocation which overlaps a PRB pair in which a
DL assignment is detected in the first slot, the RN shall assume that there is
PDSCH transmission for it in the second slot of that PRB pair.
The R-PDCCH is demodulated based on Cell-specific Reference Signals
(CRSs) transmitted on one set of antenna ports {0},{0,1},{0,1,2,3}, or based
on UE-specific Reference Signals (URSs) transmitted on antenna port 72; the
type of RSs signals is configured by higher layers (RRC).
Figure 4-29 R-PDCCH and MIMO
2 Demodulation based on USRs is possible only for a single (non-interleaved) R-PDCCH.
VRB n
VRB 7
VRB 6
VRB 5 x x
VRB 4 x x
VRB 3 x
VRB 2 x
VRB 1 x
VRB 0
slotslot
subframe
PDCCH
andothercontrolchannels
R-PDCCH
semi-static configuration
PDSCH (DeNB-RN)
dynamic allocation
DL assignment UL grant
0
7
1
2
3
RN
RN
RN
RN
21. 4 Relay
89
PDSCH andPDSCH andPDSCH andPDSCH and PUCCHPUCCHPUCCHPUCCH
The PDSCH DeNB-to-RN transmissions is processed and mapped to REs as
in case of “regular” transmission with the following exceptions:
• the PDSCH is mapped only to REs in OFDM symbols configured for
DeNB-to-RN transmission (see Fig. 4-28);
• the PDSCH is not mapped to any RE in the first slot of an RB pair on
any antenna port when the first slot of the RB pair is used for
R-PDCCH transmission on any antenna port.
The HARQ feedback on PUCCH/PUSCH is also processed as in case of
regular transmission.
Figure 4-30 PDSCH, R-PDCCH and PUCCH/PUSCH
PUSCHPUSCHPUSCHPUSCH and PHICHand PHICHand PHICHand PHICH
The RN node shall not expect HARQ feedback on PHICH, as the PHICH
channel is located in the “control channel region” of the subframe that is not
listen by the RN. ACK shall be delivered to higher layers for each transport
block transmitted on PUSCH.
The lack of PHICH feedback means that the non-adaptive UL
re-transmissions are not possible on Un interface. However, the DeNB still
can order adaptive re-transmission by signalling UL grant on R-PDCCH with
the same New Data Indicator (NDI) value as used previously for the same
HARQ process.
At the RN the number of HARQ processes depends on the subframes
configured for DeNB-RN transmissions.
radio frame radio frame
SubframeConfigurationFDD = 01010101
UL
DL
R-PDCCH (UL grant)
PDSCH
PUCCH/PUSCH (HARQ_ACK)
22. LTE-Advanced
90
Figure 4-31 R8 UL Uu i/f adaptive and non-adaptive re-Tx
Figure 4-32 R10 UL Un i/f adaptive re-Tx
Relays Compared to RepeatersRelays Compared to RepeatersRelays Compared to RepeatersRelays Compared to Repeaters
[6] RF repeaters have been used in mobile networks for a long time. RF
repeaters amplify the whole RF bandwidth without any decoding or encoding
functionality. RF repeaters have been useful for providing coverage for isolate
locations, for example covering underground locations. There are more
challenges with RF repeaters when used outdoors since RF repeaters amplify
also interference.
The RN first decodes the message from DeNB and then again encodes the
transmission towards UE using optimised packet scheduling. The RN only
sends necessary messages, making sure that interference is not unnecessarily
amplified. Another benefit of the RN is that the transmission between DeNB
and RN can use higher transmission speeds than the transmission between RN
and UE. The resources at DeNB can be quickly reallocated to serve other UEs
or other RN. The same transmission data rate must be used in both links in
radio frame radio frame
Tx Re-Tx Re-Tx
PHICH (ACK/NACK)
PDCCH (UL grant)
adaptive Re-Tx non-adaptive Re-Tx
4 ms 4 ms
UL
DL
PUSCH
radio frame radio frame
Tx Re-Tx
SubframeConfigurationFDD = 01010101
UL
DL
R-PDCCH (UL grant) PUSCH
adaptive Re-Tx
23. 4 Relay
91
case of RF repeaters. The RN has also the benefit that there are no
interference issues between its own transmission and reception because the
different directions are separated in time (inband relay) or in frequency
(outband relay) domain. The RF repeaters require careful planning and
isolation of the antennas to avoid interference problems.
Figure 4-33 Relays compared to repeaters
ReferencesReferencesReferencesReferences
[1, 3GPP 36.912] 3GPP TR 36.912 V11.0.0 (2012-09); Technical Report; 3rd
Generation Partnership Project; Technical Specification Group Radio
Access Network; Feasibility study for Further Advancements for E-
UTRA (LTE-Advanced)
[2, 3GPP 36.300] 3GPP TS 36.300 V11.4.0 (2012-12); Technical
Specification; 3rd Generation Partnership Project; Technical
Specification Group Radio Access Network; Evolved Universal
Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial
Radio Access Network (E-UTRAN); Overall description; Stage 2
[3, 3GPP 36.836] 3GPP TR 36.836 V2.0.1 (2012-10); Technical Report; 3rd
Generation Partnership Project; Technical Specification Group Radio
Access Network; Mobile Relay for Evolved Universal Terrestrial Radio
Access (E-UTRA) (LTE-Advanced)
[4, 3GPP 36.331] 3GPP TS 36.331 V11.3.0 (2013-03); Technical
Specification; 3rd Generation Partnership Project; Technical
Specification Group Radio Access Network; Evolved Universal
Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC);
Protocol specification
Relay Node RF Repeater
Decoding and
encoding
Yes
No, amplifies RF
including interference
Packet scheduling Yes No
Tx-Rx interference
avoidance
Yes, in time (inband) or
frequency (outband)
domain
Requires careful
antenna planning
Different
transmission speeds
in the two links
Yes No
24. LTE-Advanced
92
[5, 3GPP 36.216] 3GPP TS 36.216 V11.0.0 (2012-09); Technical
Specification; 3rd Generation Partnership Project; Technical
Specification Group Radio Access Network; Evolved Universal
Terrestrial Radio Access (E-UTRA); Physical layer for relaying
operation
[6] Holma, H., Toskala, A. (2012). LTE Advanced: 3GPP Solution for IMT-
Advanced. United Kingdom. Wiley-Blackwell