The document discusses various LTE measurement parameters and procedures including:
1. The eNB reports a list of detected PRACH preambles and measures timing advance, average RSSI, average SINR, UL CSI, and transport BLER for RRM purposes.
2. UE measurements include CQI, RSRP, and RSRQ while eNB measurements include timing advance, RSSI, SINR, UL CSI, detected preambles, and transport BLER. Inter-RAT measurements are also discussed.
3. Examples of RSRP, RSRQ, and timing advance procedures are provided along with CQI measurement details. PLMN selection, cell selection,
This document provides an overview and detailed descriptions of Circuit Switched Fallback (CSFB) features in an evolved Radio Access Network (eRAN). It describes CSFB procedures for falling back from an LTE network to UTRAN or GERAN networks to support circuit switched services like voice calls. The document includes sections on CSFB architectures, handover decisions and executions, related interfaces, engineering guidelines, parameters and troubleshooting.
The document summarizes LTE procedures including cell search, cell selection, cell re-selection, tracking area updates, paging, random access channel procedure, mobility handovers between X2 and S1, and handover events. The cell search procedure detects downlink synchronization using two channels, the primary and secondary synchronization channels, which are always located in the center of the available spectrum. The random access channel procedure involves the UE sending preambles, receiving a response indicating resources to use for signaling and data transmission on an uplink channel.
The document discusses an LTE training course agenda presented by the OAI Project Team. It covers topics including LTE overview, channels in LTE, cell search procedure, system information, and random access procedure. For each topic, it provides outlines, descriptions, and diagrams. The random access procedure section explains its main purpose is to achieve uplink synchronization and assign a unique UE identifier C-RNTI.
1. The document provides Huawei's mobility strategy recommendations for Maxis' LTE network, which involves LTE, UMTS, and GSM networks.
2. The strategy addresses cell selection and reselection procedures in both idle and connected modes between the different RATs and frequencies. It aims to optimize coverage and load balancing through configuration of various priority and threshold parameters.
3. Over multiple revisions from 2012 to 2018, the strategy has been updated based on trials and discussions between Maxis and Huawei to refine the parameter settings and push more users to preferred frequencies like L2600.
It is a handbook of UMTS/LTE/EPC CSFB call flows.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
This second webinar discusses LTE Air Interface, the link between a mobile device and the network, and a fundamental driver of the quality of the network.
In this paper, we discussed about LTE system throughput calculation for both TDD and FDD system.
3GPP LTE technology support both TDD and FDD multiplexing. The paper describes all the factors which affect the throughput like Bandwidth, Modulation, UE category and mulplexing. It also describes how we get throughput 300Mbps in DL and 75Mbps in UL and what are assumptions taken to calculate the same.
Paper describes the steps and formulae to calculate the throughput for FDD system for TDD Config 1 and Config 2.
The throughput calculations shown in this paper is theoretical and limited by the assumptions taken to calculate for calculations
The document discusses various LTE measurement parameters and procedures including:
1. The eNB reports a list of detected PRACH preambles and measures timing advance, average RSSI, average SINR, UL CSI, and transport BLER for RRM purposes.
2. UE measurements include CQI, RSRP, and RSRQ while eNB measurements include timing advance, RSSI, SINR, UL CSI, detected preambles, and transport BLER. Inter-RAT measurements are also discussed.
3. Examples of RSRP, RSRQ, and timing advance procedures are provided along with CQI measurement details. PLMN selection, cell selection,
This document provides an overview and detailed descriptions of Circuit Switched Fallback (CSFB) features in an evolved Radio Access Network (eRAN). It describes CSFB procedures for falling back from an LTE network to UTRAN or GERAN networks to support circuit switched services like voice calls. The document includes sections on CSFB architectures, handover decisions and executions, related interfaces, engineering guidelines, parameters and troubleshooting.
The document summarizes LTE procedures including cell search, cell selection, cell re-selection, tracking area updates, paging, random access channel procedure, mobility handovers between X2 and S1, and handover events. The cell search procedure detects downlink synchronization using two channels, the primary and secondary synchronization channels, which are always located in the center of the available spectrum. The random access channel procedure involves the UE sending preambles, receiving a response indicating resources to use for signaling and data transmission on an uplink channel.
The document discusses an LTE training course agenda presented by the OAI Project Team. It covers topics including LTE overview, channels in LTE, cell search procedure, system information, and random access procedure. For each topic, it provides outlines, descriptions, and diagrams. The random access procedure section explains its main purpose is to achieve uplink synchronization and assign a unique UE identifier C-RNTI.
1. The document provides Huawei's mobility strategy recommendations for Maxis' LTE network, which involves LTE, UMTS, and GSM networks.
2. The strategy addresses cell selection and reselection procedures in both idle and connected modes between the different RATs and frequencies. It aims to optimize coverage and load balancing through configuration of various priority and threshold parameters.
3. Over multiple revisions from 2012 to 2018, the strategy has been updated based on trials and discussions between Maxis and Huawei to refine the parameter settings and push more users to preferred frequencies like L2600.
It is a handbook of UMTS/LTE/EPC CSFB call flows.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
This second webinar discusses LTE Air Interface, the link between a mobile device and the network, and a fundamental driver of the quality of the network.
In this paper, we discussed about LTE system throughput calculation for both TDD and FDD system.
3GPP LTE technology support both TDD and FDD multiplexing. The paper describes all the factors which affect the throughput like Bandwidth, Modulation, UE category and mulplexing. It also describes how we get throughput 300Mbps in DL and 75Mbps in UL and what are assumptions taken to calculate the same.
Paper describes the steps and formulae to calculate the throughput for FDD system for TDD Config 1 and Config 2.
The throughput calculations shown in this paper is theoretical and limited by the assumptions taken to calculate for calculations
This document provides a troubleshooting guide for LTE inter-radio access technology (IRAT) handovers. It describes why IRAT is needed as voice revenues remain important while data revenues grow. It also outlines the applications of IRAT, delivery policies for idle mode, connected mode, and voice services. Signaling procedures for IRAT handovers including reselection, redirection, and PS handover are defined. Key performance indicators for IRAT including control plane delays and user plane interruption times are also defined to help diagnose IRAT issues.
The document discusses 4G LTE drive testing. It describes the necessary equipment for drive testing including a notebook, GPS, and LTE dongle. It outlines key LTE radio parameters that are measured like PCI, RSRP, SINR, and MIMO. It also discusses measuring UE state information, throughput, and LTE access procedures including attach requests, random access failures, and E-RAB failures. Finally, it compares the impact of ANR capabilities versus UE capabilities on measuring neighboring cells within and between eNodeBs.
This document provides definitions and descriptions for key performance indicators (KPIs) related to an eNodeB. It includes KPIs in areas such as accessibility, retainability, and mobility. The KPIs measure things like call setup success rates, call drop rates, and handover success rates. Templates are provided for standardized KPI definition. The document is intended for network planners, administrators, and operators to understand eNodeB performance.
This document specifies 5G RRC parameters including message definitions and information elements for timers, counters, constants, and UE variables. It defines RRC messages that may be sent on different logical channels and provides descriptions of message fields. It also specifies bandwidth part configurations, measurement reporting, reconfiguration messages, and beam failure recovery resources.
RF Planning and Optimization in GSM and UMTS NetworksApurv Agrawal
The report covers various aspects involved in improving the network coverage as well as the parameters used in planning of new network sites for GSM and UMTS networks.
Abis Over IP/Abis Optimization on-site Workshopetkisizcom
Recognize new system architecture
Understand the dimensioning rules using the Abis planning tools
Activate the Abis over IP
Activate the Abis Optimization
Use the Performance Monitoring
LTE specifications support the use of multiple antennas at both transmitter (tx) and receiver (rx). MIMO (Multiple Input Multiple
Output) uses this antenna configuration.
LTE specifications support up to 4 antennas at the tx side and up to 4 antennas at the rx side (here referred to as 4x4 MIMO
configuration).
In the first release of LTE it is likely that the UE only has 1 tx antenna, even if it uses 2 rx antennas. This leads to that so called
Single User MIMO (SU-MIMO) will be supported only in DL (and maximum 2x2 configuration).
The document discusses interworking between WCDMA and LTE networks. It describes cell reselection procedures where a UE camping on a UMTS cell can reselect to an LTE cell based on priorities broadcast in system information. The UE performs measurements of LTE frequencies and reselects to a cell with higher priority if thresholds are met. Parameters for controlling cell reselection are configured using managed object models. The document also discusses PS redirections and handovers between the networks.
The document describes the Master Information Block (MIB) and System Information Blocks (SIBs) in 5G NR networks. It provides details on the contents and purpose of the MIB, SIB1, SIB2, SIB3, SIB4 and SystemInformation message. These messages contain essential system information for cell selection and access procedures in 5G networks.
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...ProcExpl
The document is an internal training presentation on LTE system multiple antenna techniques. It provides an overview of MIMO and beamforming concepts and principles, including the advantages of multi-antenna techniques, classifications of MIMO techniques, principles of multi-antenna receive and transmit MIMO, open-loop and closed-loop spatial multiplexing, and adaptive mode configuration. The goal is for trainees to understand the concepts and basic principles of MIMO and beamforming in LTE systems.
LTE Location Management and Mobility Managementaliirfan04
Provides an overview of power management (connected and idle mode) and mobility management (both idle-mode mobility (cell selection and re-selection) and active mode (handovers).
The document discusses mobility management in LTE networks. It covers connected mode mobility including an overview of mobility triggers and handover thresholds, measurement configuration, intra-frequency handovers, inter-frequency handovers, and inter-RAT handovers. It also discusses idle mode mobility including system information blocks and cell selection procedures for intra-frequency, inter-frequency, and inter-RAT mobility. The presentation provides details on the different mobility management procedures and configuration parameters in LTE networks.
This third webinar discusses the fundamentals of LTE Carriers and how LTE mobiles communicate with the network including what factors affect performance.
This document provides guidelines for LTE radio frequency (RF) network optimization. It describes the network optimization process including single site verification and RF optimization. Key aspects of RF optimization covered include preparing by collecting data and analyzing problems, adjusting parameters such as transmit power and neighbor lists, and ensuring optimization objectives like coverage, signal quality, and handover success rates are met. The document also details common issues like weak coverage, lack of a dominant cell, and cross coverage and methods for resolving them.
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBVikas Shokeen
SRVCC allows a voice call on an LTE network to be handed over to a 2G or 3G network when the user moves out of LTE coverage, ensuring the call does not drop. It uses the STN-SR identity to route the call via the MSC to the IMS network. During the SRVCC handover, the MME splits the voice bearer from other bearers and initiates relocation of the voice bearer to the MSC while relocating other bearers to the SGSN. The MSC then establishes the CS leg with the IMS network using STN-SR to complete the handover without dropping the call.
This document outlines an agenda for eight sessions on LTE system overview and operation. Session 1 provides an overview of LTE cellular systems, specifications, and network architecture. Sessions 2-8 cover OFDMA and SCFDMA concepts, LTE transmission schemes, protocol architecture, MIMO, UE operations, cell acquisition procedures, handover, and UE testing. The document lists references on LTE system design books and 3GPP specifications.
The document provides an overview of cellular communications signaling for LTE, LTE-A, and 4G technologies. It describes the LTE architecture including functions of the evolved node B, mobility management entity, serving gateway, home subscriber server, and PDN gateway. It also provides details on the LTE physical layer including OFDMA modulation, reference signal measurements for handover, and an example handover procedure using the X2 interface. In conclusion, it discusses key criteria for designing handovers and aspects for further research.
The document provides an overview of Long Term Evolution (LTE) technology. It discusses that LTE is the next generation mobile network standard that uses an all-IP flat network architecture. LTE networks employ OFDMA for the downlink and SC-FDMA for the uplink. Key performance targets of LTE include peak data rates of over 100 Mbps downlink and 50 Mbps uplink, low latency, and improved spectrum efficiency. The document also outlines the LTE network architecture including components like the eNodeB, MME, SGW, and PGW.
The document introduces LTE network planning and RNP solutions. It discusses the flat LTE network architecture and protocols including OFDM and MIMO. LTE network planning includes coverage and capacity planning using link budget and capacity estimation. The RNP solution introduces tools for performance enhancement like interference avoidance and co-antenna analysis.
The document discusses the commonalities and differences between Time Division Duplexing (TDD) and Frequency Division Duplexing (FDD) modes in the Long Term Evolution (LTE) air interface. Key commonalities include using the same radio interface schemes, subframe formats, network architecture, and air interface protocols. Key differences are that TDD uses the same frequency band for both uplink and downlink while FDD requires paired spectrum, and TDD UEs do not need a duplex filter while FDD UEs do.
The document discusses various topics related to LTE including LTE radio procedures, physical channels and signals, mobility, and testing and measurement. On day two, it focuses on LTE radio procedures such as initial access, downlink physical channels and signals, cell search, and reference signals. It also covers uplink physical channels and signals, mobility procedures, and hybrid ARQ.
This document provides a troubleshooting guide for LTE inter-radio access technology (IRAT) handovers. It describes why IRAT is needed as voice revenues remain important while data revenues grow. It also outlines the applications of IRAT, delivery policies for idle mode, connected mode, and voice services. Signaling procedures for IRAT handovers including reselection, redirection, and PS handover are defined. Key performance indicators for IRAT including control plane delays and user plane interruption times are also defined to help diagnose IRAT issues.
The document discusses 4G LTE drive testing. It describes the necessary equipment for drive testing including a notebook, GPS, and LTE dongle. It outlines key LTE radio parameters that are measured like PCI, RSRP, SINR, and MIMO. It also discusses measuring UE state information, throughput, and LTE access procedures including attach requests, random access failures, and E-RAB failures. Finally, it compares the impact of ANR capabilities versus UE capabilities on measuring neighboring cells within and between eNodeBs.
This document provides definitions and descriptions for key performance indicators (KPIs) related to an eNodeB. It includes KPIs in areas such as accessibility, retainability, and mobility. The KPIs measure things like call setup success rates, call drop rates, and handover success rates. Templates are provided for standardized KPI definition. The document is intended for network planners, administrators, and operators to understand eNodeB performance.
This document specifies 5G RRC parameters including message definitions and information elements for timers, counters, constants, and UE variables. It defines RRC messages that may be sent on different logical channels and provides descriptions of message fields. It also specifies bandwidth part configurations, measurement reporting, reconfiguration messages, and beam failure recovery resources.
RF Planning and Optimization in GSM and UMTS NetworksApurv Agrawal
The report covers various aspects involved in improving the network coverage as well as the parameters used in planning of new network sites for GSM and UMTS networks.
Abis Over IP/Abis Optimization on-site Workshopetkisizcom
Recognize new system architecture
Understand the dimensioning rules using the Abis planning tools
Activate the Abis over IP
Activate the Abis Optimization
Use the Performance Monitoring
LTE specifications support the use of multiple antennas at both transmitter (tx) and receiver (rx). MIMO (Multiple Input Multiple
Output) uses this antenna configuration.
LTE specifications support up to 4 antennas at the tx side and up to 4 antennas at the rx side (here referred to as 4x4 MIMO
configuration).
In the first release of LTE it is likely that the UE only has 1 tx antenna, even if it uses 2 rx antennas. This leads to that so called
Single User MIMO (SU-MIMO) will be supported only in DL (and maximum 2x2 configuration).
The document discusses interworking between WCDMA and LTE networks. It describes cell reselection procedures where a UE camping on a UMTS cell can reselect to an LTE cell based on priorities broadcast in system information. The UE performs measurements of LTE frequencies and reselects to a cell with higher priority if thresholds are met. Parameters for controlling cell reselection are configured using managed object models. The document also discusses PS redirections and handovers between the networks.
The document describes the Master Information Block (MIB) and System Information Blocks (SIBs) in 5G NR networks. It provides details on the contents and purpose of the MIB, SIB1, SIB2, SIB3, SIB4 and SystemInformation message. These messages contain essential system information for cell selection and access procedures in 5G networks.
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...ProcExpl
The document is an internal training presentation on LTE system multiple antenna techniques. It provides an overview of MIMO and beamforming concepts and principles, including the advantages of multi-antenna techniques, classifications of MIMO techniques, principles of multi-antenna receive and transmit MIMO, open-loop and closed-loop spatial multiplexing, and adaptive mode configuration. The goal is for trainees to understand the concepts and basic principles of MIMO and beamforming in LTE systems.
LTE Location Management and Mobility Managementaliirfan04
Provides an overview of power management (connected and idle mode) and mobility management (both idle-mode mobility (cell selection and re-selection) and active mode (handovers).
The document discusses mobility management in LTE networks. It covers connected mode mobility including an overview of mobility triggers and handover thresholds, measurement configuration, intra-frequency handovers, inter-frequency handovers, and inter-RAT handovers. It also discusses idle mode mobility including system information blocks and cell selection procedures for intra-frequency, inter-frequency, and inter-RAT mobility. The presentation provides details on the different mobility management procedures and configuration parameters in LTE networks.
This third webinar discusses the fundamentals of LTE Carriers and how LTE mobiles communicate with the network including what factors affect performance.
This document provides guidelines for LTE radio frequency (RF) network optimization. It describes the network optimization process including single site verification and RF optimization. Key aspects of RF optimization covered include preparing by collecting data and analyzing problems, adjusting parameters such as transmit power and neighbor lists, and ensuring optimization objectives like coverage, signal quality, and handover success rates are met. The document also details common issues like weak coverage, lack of a dominant cell, and cross coverage and methods for resolving them.
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBVikas Shokeen
SRVCC allows a voice call on an LTE network to be handed over to a 2G or 3G network when the user moves out of LTE coverage, ensuring the call does not drop. It uses the STN-SR identity to route the call via the MSC to the IMS network. During the SRVCC handover, the MME splits the voice bearer from other bearers and initiates relocation of the voice bearer to the MSC while relocating other bearers to the SGSN. The MSC then establishes the CS leg with the IMS network using STN-SR to complete the handover without dropping the call.
This document outlines an agenda for eight sessions on LTE system overview and operation. Session 1 provides an overview of LTE cellular systems, specifications, and network architecture. Sessions 2-8 cover OFDMA and SCFDMA concepts, LTE transmission schemes, protocol architecture, MIMO, UE operations, cell acquisition procedures, handover, and UE testing. The document lists references on LTE system design books and 3GPP specifications.
The document provides an overview of cellular communications signaling for LTE, LTE-A, and 4G technologies. It describes the LTE architecture including functions of the evolved node B, mobility management entity, serving gateway, home subscriber server, and PDN gateway. It also provides details on the LTE physical layer including OFDMA modulation, reference signal measurements for handover, and an example handover procedure using the X2 interface. In conclusion, it discusses key criteria for designing handovers and aspects for further research.
The document provides an overview of Long Term Evolution (LTE) technology. It discusses that LTE is the next generation mobile network standard that uses an all-IP flat network architecture. LTE networks employ OFDMA for the downlink and SC-FDMA for the uplink. Key performance targets of LTE include peak data rates of over 100 Mbps downlink and 50 Mbps uplink, low latency, and improved spectrum efficiency. The document also outlines the LTE network architecture including components like the eNodeB, MME, SGW, and PGW.
The document introduces LTE network planning and RNP solutions. It discusses the flat LTE network architecture and protocols including OFDM and MIMO. LTE network planning includes coverage and capacity planning using link budget and capacity estimation. The RNP solution introduces tools for performance enhancement like interference avoidance and co-antenna analysis.
The document discusses the commonalities and differences between Time Division Duplexing (TDD) and Frequency Division Duplexing (FDD) modes in the Long Term Evolution (LTE) air interface. Key commonalities include using the same radio interface schemes, subframe formats, network architecture, and air interface protocols. Key differences are that TDD uses the same frequency band for both uplink and downlink while FDD requires paired spectrum, and TDD UEs do not need a duplex filter while FDD UEs do.
The document discusses various topics related to LTE including LTE radio procedures, physical channels and signals, mobility, and testing and measurement. On day two, it focuses on LTE radio procedures such as initial access, downlink physical channels and signals, cell search, and reference signals. It also covers uplink physical channels and signals, mobility procedures, and hybrid ARQ.
This document provides an overview of topics covered in a two-day LTE training session, including:
1. An introduction to LTE radio procedures such as initial access, downlink physical channels, and cell search.
2. Details on synchronization signals like the primary and secondary synchronization signals that help devices find and synchronize to cells.
3. Descriptions of downlink reference signals and the system information broadcast channel that provide essential configuration details to devices.
The document discusses the LTE attach call flow process, including:
1. An overview of the evolution of cellular systems and the introduction of 5G.
2. The decoding processes involved in LTE attach which include frequency scanning, decoding the PSS, SSS, MIB, PDCCH, and SIBs.
3. The steps in the LTE attach process such as the random access channel process, sending an RRC connection request, receiving an RRC connection setup, and responding with an RRC connection setup complete message.
The document provides an overview of LTE physical layer specifications including OFDMA frame structure, resource block structure, protocol architecture, physical channel structure and procedures, UE measurements like RSRP and RSRQ, and key enabling technologies of LTE such as OFDM, SC-FDMA, and MIMO. It describes the LTE requirements for high peak data rates, low latency, support for high mobility users, and flexible spectrum deployment.
The document provides an overview of LTE physical layer specifications including OFDMA frame structure, resource block structure, protocol architecture, physical channel structure and procedures, UE measurements like RSRP and RSRQ, and key enabling technologies of LTE such as OFDM, SC-FDMA, and MIMO. It describes the LTE requirements for high peak data rates, low latency, support for high mobility users, and enhanced broadcast services.
This document provides an overview of LTE air interface concepts including:
- Main LTE features such as frequency bands and mobility protocols.
- The LTE protocol stack including layers such as RRC, PDCP, RLC, MAC and physical.
- LTE channel types including logical, transport, and physical channels.
- Key physical channel functions like reference signals, synchronization signals, broadcast channels, and control channels.
- Uplink/downlink channel structures including time and frequency domain configurations.
The document discusses computer networks and media access control. It covers topics like Ethernet, wireless LANs, Bluetooth, Wi-Fi, switching, bridging, IP, and more. The key points are:
1. It provides an overview of the topics to be discussed, including media access control, Ethernet standards, wireless technologies, and internetworking basics.
2. It summarizes the evolution of Ethernet and discusses its physical properties, frame format, addressing, and transmitter algorithm using CSMA/CD.
3. It describes wireless LAN standards like Bluetooth and Wi-Fi, addressing problems in wireless networks, and discussing concepts like spread spectrum, CSMA/CA, and network architectures.
Fibre Channel is a high-speed network technology primarily used for storage networking. It provides serial data transfer at speeds of 1-8Gbps. Fibre Channel includes the advantages of both channels (speed and reliability) and networks (scalability). It supports various topologies including point-to-point, arbitrated loop (FC-AL), and switched fabric. The switched fabric topology uses 24-bit addressing and can scale to connect over 16 million devices across multiple switches. Fibre Channel operates at seven layers, with the physical layer defining cable types and speeds, and upper layers defining protocols encapsulated for transport.
The document discusses key concepts in 3GPP Long Term Evolution (LTE) including Orthogonal Frequency Division Multiplexing (OFDM), why OFDM was chosen for the LTE downlink, the difference between OFDM and OFDMA, how Single Carrier Frequency Division Multiple Access (SC-FDMA) is used in the LTE uplink instead of OFDM due to its lower peak-to-average power ratio, and how multiple-input multiple-output (MIMO) techniques can increase channel capacity, robustness and coverage for LTE. It provides high-level explanations of LTE physical signals, channels and how they are modulated and mapped in the time-frequency domain.
The document provides an overview of the agenda and content for a training on Samsung eNodeB integration and commissioning. Day 2 focuses on Samsung eNodeB and LSMR (LTE Site Manager - Radio) basics, as well as the process for growing and integrating eNodeBs. Key topics covered include the hardware and software architecture of Samsung eNodeBs and LSMRs, as well as their functions and interfaces. The training will also cover configuring and activating eNodeBs using the LSMR system, as well as performing automatic neighbor relations and cell optimization functions.
Some questions and answers on lte radio interfaceThananan numatti
The document contains questions and answers about LTE radio interface concepts. It discusses:
- How the UE is scheduled via the PDCCH containing DCI messages for uplink/downlink scheduling.
- That PDCP is located in the eNodeB and handles encryption, header compression, and reordering at handover.
- That a resource block occupies 12 subcarriers and one time slot of 0.5ms in the frequency and time domains.
CAN (Controller Area Network) bus is a protocol used in automobiles and industrial automation to allow microcontrollers and devices to communicate over a bus. It uses a multi-master broadcast communication method with message prioritization. Each node on the CAN bus is connected via a twisted pair cable and uses a CAN controller with a bus interface unit to send and receive messages on the bus based on the CAN protocol, which defines the message format and error detection through cyclic redundancy checks. CAN is commonly used in vehicles to allow electronic control units to communicate for functions like engine management and safety systems.
1. The LTE initial access procedure involves cell search, cell selection, derivation of system information, and random access. This allows the UE to access the network and receive or transmit data.
2. The UE scans channels to measure RSSI, decodes synchronization signals to identify candidate cells, and decodes MIB and SIB to obtain cell information like frequency, PCI, and PLMN.
3. The UE then selects a suitable cell based on criteria like sufficient signal strength and matching PLMN, and performs random access to begin communication with the network.
This document discusses various topics related to Long Term Evolution (LTE) including call flow, radio link failure, discontinuous reception (DRX), paging, scheduling, random access channel (RACH) procedure, self-organizing networks (SON), and quality of service (QoS). It provides details on the call flow process when a user equipment (UE) is powered on, performs initial cell selection and attachment, and establishes a default bearer. It also describes procedures for radio link failure, DRX, paging, scheduling, RACH, SON functions including self-configuration and optimization, and QoS with default and dedicated bearers.
This document provides an overview of 4G LTE technology. It discusses key LTE concepts such as OFDM and MIMO used in the downlink and uplink, as well as requirements for IMT-Advanced systems. It describes the 3GPP releases that specified LTE and LTE-Advanced standards and components of the LTE network architecture including the E-UTRAN, EPC, and interfaces between nodes. The document also provides explanations of OFDM, MIMO, SC-FDMA, and the LTE physical layer frame structure and resource grid. Special features introduced in LTE-Advanced like carrier aggregation and relaying are also summarized.
- The document discusses concepts related to mobility management in cellular networks including location areas, tracking areas, UE procedures from power on to being attached to the network, procedures in idle and active modes, and handover.
- It describes the protocol stack in LTE including the RRC states of idle and connected, and provides terminology used in 3GPP including PLMN, IMSI, IMEI, camping on a cell, and attaching to the network.
- It explains cell selection and reselection criteria where the UE ranks cells based on measurements of signal strength and quality and selects the highest ranked cell meeting the criteria.
This document provides an overview of 4G LTE technology. It discusses key LTE concepts such as OFDM and MIMO used in the downlink and uplink, as well as requirements for IMT-Advanced systems. It describes the 3GPP specification releases that defined LTE and LTE-Advanced. The document outlines the LTE network architecture including the E-UTRAN, EPC, and interfaces between nodes. It explains technologies like carrier aggregation and CoMP used in LTE-Advanced. Key physical layer aspects of LTE like resource allocation and scheduling are also summarized.
This slide is very fruitful for those engineering students who give high preference to communication subject like Telecommunication, Optical Fiber Communication and even Wireless communication.
The Abis interface connects the Base Station Controller (BSC) and the Base Transceiver Station (BTS) in a GSM network. It transfers synchronization information, signaling between the BSC and BTS, and traffic such as encoded speech. The Link Access Procedure on the D-channel (LAPD) protocol is used to provide acknowledged and unacknowledged signaling over the Abis interface using frames that contain flags, frame check sequences, commands, addresses, and information fields. Key information carried over Abis includes synchronization, signaling between the Transceiver Handler and Transceiver Controller, encoded speech using various coding schemes, and in-band signaling between the BSC and BTS components.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
2. Irfan Ali 2İrfan Ali 2
Overview
• Downlink: How are control and data information sent to multiple mobiles?
Ø OFDM
Ø Downlink Radio Frame Structure
Ø In a sub-frame, how does a mobile know where to look for data.
Ø Logical Channels and Physical Channels
Ø Radio Protocol stack
Ø Channel signal strength measurement
• Uplink: How is control and data information received from multiple mobiles?
Ø SC-FDMA
Ø Uplink Radio Frame Structure
Ø Radio Frame Synchronization (Timing Advance)
Ø Physical Channels and Logical Channels
Ø Uplink Reference Signal Transmission
3. Irfan Ali 3İrfan Ali 3
When does the base-station talk and when do the mobiles talk?
• The question is when and “where” in the time-frequency domain.
• LTE supports two duplexing modes:
Ø Frequency Division Duplexing (FDD)
Ø Time Division Duplexing (TDD)
Time
Frequency (MHz)
20 MHz
20 MHz
2110
2130
1920
1940
Downlink
Uplink
Frequency Division Duplexing
4. Irfan Ali 4İrfan Ali 4
What if OFDM
• OFDM = Orthogonal Frequency Division Multiplexing
• What are orthogonal functions?
Ø Two functions h1(t) and h2(t) are orthogonal over an interval
[0,T], if
Ø Set of functions {h1(t) , h2(t) ,…, hn(t) } are mutually orthogonal, if
Ø If g(t) = a1h1(t) + a2h2(t) + … + anhn(t), for [0,T], then
ℎ",ℎ$ = ' ℎ" 𝑡 ℎ$ 𝑡 𝑑𝑡
*
+
= 0
ℎ-, ℎ. = 0, if 𝑖 ≠ 𝑘, and ℎ-,ℎ- = 𝑚-
𝑔, ℎ- = 𝛼-ℎ-,ℎ- = 𝛼- 𝑚-, for 𝑖 = 1. . 𝑛
5. Irfan Ali 5İrfan Ali 5
• Harmonics (multiples) of cosine functions of frequency f0, are orthogonal over the base time-period, T = 1/f0
• Let f0 = 15 kHz , T = 66.67 µs
Orthogonal cosine functions
ℎ" = 2cos 2𝜋𝑓+ 𝑡
66.67 µs
Time
1.4
15kHz
x(t)
ℎ$ = 2cos 2𝜋.2𝑓+ 𝑡
66.67 µs
Time
1.4
30kHz
ℎB = 2cos 2𝜋.3𝑓+ 𝑡
66.67 µs
Time
1.4
45kHz
ℎ"$ = 2cos 2𝜋.12𝑓+ 𝑡
66.67 µs
Time
1.4
180kHz
𝑔 = −1.5 ℎ" + 𝑟𝑎𝑛𝑑(1,−1)ℎ$ + ⋯+ 𝑟𝑎𝑛𝑑(1,−1)ℎ"$
𝑔,ℎ"
g(t)
g(t)h1(t)
𝑔,ℎ"
6. Irfan Ali 6İrfan Ali 6
What is OFDM
• Orthogonal Frequency Division Multiplexing
T 2T
15
30
45
60
180
3T 4T 5T 6T 7T 8T 9T 10T 11T 12T 13T 14T
66.67 µs
Time
1.4
30kHz
66.67 µs
Time
1.4
45kHz
66.67 µs
Time
1.4
180kHz
15 30 45 60 75-15-30-45-60-75
15 30 45 60 75-15-30-45-60-75
15 30 45 60 75-15-30-45-60-75
Frequency Domain
Frequency (kHz)
15 30 45 60 75-15-30-45-60-75
|X(f)|
66.67 µs
Time
1.4
15kHz
x(t)
frequency
(kHz)
Time
1 ms
Subframe
7. Irfan Ali 7İrfan Ali 7
How is OFDM signal generated?
Modulate
Add
Cyclic
Prefix
Mix to
RF
PA
Add
Cyclic
Prefix
Digital to
Analog
Mix to
Baseband
Remove
Cyclic
Prefix
Serial to
Parallel
…
f0
2f0
3f0
Nf0
Parallel to
Serial
…
f0
2f0
3f0
Nf0
LNA
Input bit stream
De-Modulate
Output bit stream
Inverse
FFT
FFT
Remove
Cyclic
Prefix
Analog
to Digital
8. Irfan Ali 8İrfan Ali 8
Why OFDM?
• The OFDM symbols duration is relatively long (66.67 µs), which
allows one to add time-gap (preamble) to handle relatively long
delay-spread of the channel (5 µs ~ 1.5 km) without loosing much
capacity.
Ø Reduced inter-symbol interference
• Multiple sub-carriers (rather than a single carrier) over large
bandwidths (20 MHz) enable to handle channel-fades over these
large bandwidths.
• Increased processing capability.
9. Irfan Ali 9İrfan Ali 9
LTE Downlink Frame Structure
Channel
Bandwidth
MHz
# Resource
Blocks in
Frequency
Domain
Total
Subcarrier
Bandwidth
MHz
1.4
MHz
6 1.095
3 MHz 15 2.715
5 MHz 25 4.515
10 Mhz 50 9.015
15 Mhz 75 13.515
20 Mhz 100 18.015
1ms
Subframe
Radio Frame
10 ms
Radio Frame
10 ms
System Frame Number
SFN n
System Frame Number
SFN n+1
Time
Frequency
10. Irfan Ali 10İrfan Ali 10
Synchronizing to DL Radio Frame
Radio Frame
10 ms
Radio Frame
10 ms
System Frame Number
SFN n
System Frame Number
SFN n+1
Frequency
Time
Secondary Synchronization
Signal (SSS)
Physical Broadcast
Channel (PBCH)
Primary Synchronization
Signal (PSS)
62subcarriers
72subcarriers
3MHz
Cell Reference Signal
MIB
• Downlink Bandwidth
• System Frame Number
• PHICH Configuration
PHICH Physical Hybrid ARQ Indicator Channel
11. Irfan Ali 11İrfan Ali 11
Synchronization Signals
• The Primary Synchronization Signal is allocated to the central 62 subcarriers in the 1st and 6th
subframe of every Radio Frame. It’s in the 7th symbol in the subframe. Both transmissions are
identical.
• The Primary Synchronization Signal is used to:
Ø Achieve symbol, slot and subframe synchronization
Ø Determine the first part of Physical Layer Cell Identity (PCI): 3 values.
• The Secondary Synchronization Signal is allocated to the central 62 subcarriers in the 1st and 6th
subframe of every Radio Frame. It’s in the 6th symbol in the subframe.
• The 2 SSS transmissions within each radio frame use different sequences to allow the UE to
differentiate between the 1st and 2nd transmission, i.e. allowing the UE to achieve frame
synchronization.
• The Secondary Synchronization Signal is used to:
Ø Achieve frame synchronization
Ø Determine the second part of Physical Layer Cell Identity: 168 different values. This way the UE determines the
PCI of the cell, which is 1 of 504 different values
12. Irfan Ali 12İrfan Ali 12
Downlink Physical Channels
Radio Frame
10 ms
Radio Frame
10 ms
System Frame Number
SFN n
System Frame Number
SFN n+1
Frequency
Time
Physical Broadcast
Channel (PBCH)
62subcarriers
72subcarriers
Physical Downlink Control
Channel (PDCCH)
Physical Downlink Shared
Channel (PDSCH)
3MHz
Physical Control Format
Indicator Channel (PCFICH)
Physical Hybrid ARQ
Indicator Channel (PHICH)
13. Irfan Ali 13İrfan Ali 13
Physical Downlink Shared Channel (PDSCH)
• In the remaining 11 symbols of the
subframe
• Transfers :
Ø System Information Blocks (SIBs).
Ø Paging RRC message
Ø Other RRC messages
Ø Application data.
• QPSK (2 bits/RE), 16 QAM (4 bits/RE) or
64 QAM (6 bits/RE) modulation is used.
SIB-2
Paging UE-1
UE-2 RRC Message
UE-3 Data Radio Bearer
UE-3 Data Radio Bearer
1.4MHz
Subframe (1ms)
14. Irfan Ali 14İrfan Ali 14
Physical Downlink Control Channel (PDCCH)
• In the first 1-to-3 (configurable) symbols
of every subframe (1 ms)
• Transfers Downlink Control Information
(DCI).
• DCI messages consists of multiples
(i=1,2,3,4) of 36 resource elements.
• Three goals:
Ø Downlink resource allocation for
same subframe.
• Allocated as Resource Block Group
• RBG Size = 1, for 1.4 MHz,
• RBG Size = 4, for 20 MHz
• Bitmap used to indicate which RBG is
allocated to UE
Ø Uplink resource allocation
Ø Transmit Power Control
• QPSK modulation is used (2 bits/RE)
• DCI has a 16 bit CRCUplink
Resource
Allocation
for UE 2
1.4MHz
Subframe (1ms)
SIB-2
Paging UE-1
UE-2 RRC Message
UE-3 Data Radio Bearer
UE-3 Data Radio Bearer
15. Irfan Ali 15İrfan Ali 15
How does a mobile know if there is a message for it in a subframe?
• There are four identities that a mobile
searches for in the Downlink Control
Information (DCI) in the PDCCH:
Ø UE’s unique cell-radio network
temporary identity (C-RNTI)
Ø Paging-RNTI, P-RNTI (0xFFFE) and
Ø System Information-RNTI, SI-RNTI
(0xFFFF).
Ø P-RNTI and SI-RNTI are the same for all
mobiles.
Ø The check for P-RNTI and SI-RNTI are not
performed in every subframe, but on
selected/ “paging-occasion” subframes,
(once every DRX cycle).
Ø During Random access
1. Random Access-RNTI (RA-RNTI): For Random
access response message.
2. Temporary C-RNTI: For RRC Connection Setup
message
• In the PDSCH, the MAC header tells the
mobile, if the message is an RRC message or a
data packet
Ø Logical Channel ID = 0..2 -> SRB 0..2
Ø Logical Channel ID = 3..10 -> DRBs
Uplink
Resource
Allocation
for UE 2
1.4MHz
Subframe (1ms)
SIB-2
Paging UE-1
UE-2 RRC Message
UE-3 Data Radio Bearer
UE-3 Data Radio Bearer
C-RNTI 2
C-RNTI 3
C-RNTI 2
P-RNTI
SI-RNTI
16. Irfan Ali 16İrfan Ali 16
How does the mobile find out what information is being sent to it?
• If Logical Channel ID == 0 (SRB0) Common Control Channel (CCCH)
DL-CCCH-MessageType ::= CHOICE {
rrcConnectionReestablishment
rrcConnectionReestablishmentReject
rrcConnectionReject
rrcConnectionSetup }
• If Logical Channel ID == 1, 2 (SRB1 and SRB2) Dedicated Control Channel (DCCH)
DL-DCCH-MessageType ::= CHOICE {
csfbParametersResponseCDMA2000
dlInformationTransfer
handoverFromEUTRAPreparationRequest
mobilityFromEUTRACommand
rrcConnectionReconfiguration
rrcConnectionRelease
securityModeCommand
ueCapabilityEnquiry
counterCheck
ueInformationRequest-r9
spare6 NULL, spare5 NULL, spare4 NULL,
spare3 NULL, spare2 NULL, spare1 NULL }
• If Logical Channel ID == 3-10 (DRBs): Dedicated Traffic Chanel (DTCH). Data traffic
Sent before RRC Channel is setup
Sent after RRC Channel is setup
18. Irfan Ali 18İrfan Ali 18
Downlink Protocol Layers and Channel Mapping in eNB
RRC
ROHC ROHC
Encryption Encryption
Sequence
Number
Sequence
Number
PDCP
RLC
MAC
PHY
RRC/
Data
Segmentation
Acknowledged
Mode (ARQ)
Segmentation
Acknowledged
Mode (ARQ)
DCCH
LCID1 LCID2
Integrity
Protection
Encryption
Sequence
Number
Integrity
Protection
Encryption
Sequence
Number
Segmentation Segmentation
UnAck
Mode
UnAck
Mode
LCID3 LCID4
DTCH
MIB SIB SRB0 SRB1 SRB2 DRB1 DRB2Page
PDSCH, C-RNTI
Transparent
Mode
(Buffer)
BCCH
PDSCH, SI-RNTIPBCH
Transparent
Mode
(Buffer)
PCCH
PDSCH, P-RNTI
Logical Channels
Transport Channels/
Physical Channels
Transparent
Mode
(Buffer)
CCCH
LCID0
PDSCH, Temporary C-RNTI
RRC Radio Resource Control
PDCP Packet Data Convergence Protocol
RLC Radio Link Control
MAC Medium Access Control
Scheduling
Priority Handling
HARQ
Multiplexing of MAC SDUs
19. Irfan Ali 19İrfan Ali 19
Downlink Protocol Layers and Channel Mapping in eNB
RRC
ROHC ROHC
Encryption Encryption
Sequence
Number
Sequence
Number
PDCP
RLC
MAC
PHY
RRC/
Data
Segmentation
Acknowledged
Mode (ARQ)
Segmentation
Acknowledged
Mode (ARQ)
DCCH
LCID1 LCID2
Integrity
Protection
Encryption
Sequence
Number
Integrity
Protection
Encryption
Sequence
Number
Segmentation Segmentation
UnAck
Mode
UnAck
Mode
LCID3 LCID4
DTCH
MIB SIB SRB0 SRB1 SRB2 DRB1 DRB2Page
PDSCH, C-RNTI
Transparent
Mode
(Buffer)
BCCH
PDSCH, SI-RNTIPBCH
Transparent
Mode
(Buffer)
PCCH
PDSCH, P-RNTI
Logical Channels
Transport Channels/
Physical Channels
Transparent
Mode
(Buffer)
CCCH
LCID0
PDSCH, Temporary C-RNTI
RRC Radio Resource Control
PDCP Packet Data Convergence Protocol
RLC Radio Link Control
MAC Medium Access Control
Scheduling
Priority Handling
HARQ
Multiplexing of MAC SDUs
Physical Downlink Control
Channel (PDCCH)
Physical Downlink Shared
Channel (PDSCH)
Physical Broadcast
Channel (PBCH)
Source: Netmanias
20. Irfan Ali 20İrfan Ali 20
Downlink Protocol Layers and Channel Mapping in eNB
RRC
ROHC ROHC
Encryption Encryption
Sequence
Number
Sequence
Number
PDCP
RLC
MAC
PHY
RRC/
Data
Segmentation
Acknowledged
Mode (ARQ)
Segmentation
Acknowledged
Mode (ARQ)
DCCH
LCID1 LCID2
Integrity
Protection
Encryption
Sequence
Number
Integrity
Protection
Encryption
Sequence
Number
Segmentation Segmentation
UnAck
Mode
UnAck
Mode
LCID3 LCID4
DTCH
MIB SIB SRB0 SRB1 SRB2 DRB1 DRB2Page
PDSCH, C-RNTI
Transparent
Mode
(Buffer)
BCCH
PDSCH, SI-RNTIPBCH
Transparent
Mode
(Buffer)
PCCH
PDSCH, P-RNTI
Logical Channels
Transport Channels/
Physical Channels
Transparent
Mode
(Buffer)
CCCH
LCID0
PDSCH, Temporary C-RNTI
RRC Radio Resource Control
PDCP Packet Data Convergence Protocol
RLC Radio Link Control
MAC Medium Access Control
Scheduling
Priority Handling
HARQ
Multiplexing of MAC SDUs
RLC
Header
n n + 1 n + 2 n + 3
RLC
Header
RLC SDU
RLC PDU
21. Irfan Ali 21İrfan Ali 21
Downlink Protocol Layers and Channel Mapping in eNB
RRC
ROHC ROHC
Encryption Encryption
Sequence
Number
Sequence
Number
PDCP
RLC
MAC
PHY
RRC/
Data
Segmentation
Acknowledged
Mode (ARQ)
Segmentation
Acknowledged
Mode (ARQ)
DCCH
LCID1 LCID2
Integrity
Protection
Encryption
Sequence
Number
Integrity
Protection
Encryption
Sequence
Number
Segmentation Segmentation
UnAck
Mode
UnAck
Mode
LCID3 LCID4
DTCH
MIB SIB SRB0 SRB1 SRB2 DRB1 DRB2Page
PDSCH, C-RNTI
Transparent
Mode
(Buffer)
BCCH
PDSCH, SI-RNTIPBCH
Transparent
Mode
(Buffer)
PCCH
PDSCH, P-RNTI
Logical Channels
Transport Channels/
Physical Channels
Transparent
Mode
(Buffer)
CCCH
LCID0
PDSCH, Temporary C-RNTI
RRC Radio Resource Control
PDCP Packet Data Convergence Protocol
RLC Radio Link Control
MAC Medium Access Control
Scheduling
Priority Handling
HARQ
Multiplexing of MAC SDUs
22. Irfan Ali 22İrfan Ali 22
Example of IDs in the PDCCH and message in PDSCH
MIB
SIB-1
SIB-2
SIB-5
Random Access Preamble
Random Access Response
RRC Connection Request
RRC Connection Setup
RRC Connection SetupComplete
DL Info Transfer (NAS: Authn Req)
Physical Downlink Control
Channel (PDCCH)
Physical Downlink Shared
Channel (PDSCH)
Physical Broadcast
Channel (PBCH)
ID in PDCCH MAC Packet
SI-RNTI SIB
RA-RNTI RAR
C-RNTI
LCID
1
LCID
29
Timing
Advance
NAS Message
Authn Request
RAPID, Uplink Grant, TC-RNTI
TC-RNTI
LCID
0
LCID
31
LCID
28
UE Contention
Resolution ID
RRC Connection
Setup
Pad
RRC Connection Req Msg
…
RRC Connection Request
UE-Identity rand
Establish-cause mo-data, mo-signaling,
mt-Access, …
Info Content
MIB Downlink Channel Bandwidth, PHICH Configuration, SFN
SIB 1 PLMN ID, Tracking Area Code, Cell Selection Parameters, Frequency band,
cell barring, Schedulinginfo for other SIBs
SIB2 Access Class Barring, Channel (RACH, BCCH, ..) parameters, UE timers,
UL Carrier Frequency
SIB3 Cell Selection Parameters
SIB4 Inter Frequency neighbour cell info
SIB5 Intra Frequency neighbour cell info
23. Irfan Ali 23İrfan Ali 23
Cell Reference Signals (CRS)
• Cell Reference Signals
Ø Known reference signals are inserted at regular intervals within the OFDM time-
frequency grid.
Ø There are four resource elements per resource block that are dedicated to
Reference Signal.
7 symbols = 0.5 ms
(Slot)
12subcarriers=180kHz
Æ The location of Reference Signals depends
on the Physical layer cell identity of the cell.
Æ The Primary and Secondary Synchronization
Signals the Physical Layer Cell Identity Resource Elements used
for Reference Signal
24. Irfan Ali 24İrfan Ali 24
Reference Signal Received Power (RSRP)
• The RSRP is the average power (in watts) received from a single Reference Signal (RS)
resource element
• RSRP measures only the RS power and excludes all noise and interference power.
• Knowledge of absolute RSRP enables mobile to calculate downlink path-loss.
• The maximum RSRP is based on maximum input power to UE of -25dBm (0.0032
mWatts). In 1.4 MHz BW with 6 RBs (72 Resource Elements), max RSRP is -44 dBm.
• The minimum value is -140 dBm (has 6 dBm of margin from minimum possible
received power at UE).
7 symbols = 0.5 ms
(Slot)
12subcarriers=180kHz
Resource Elements used
for Reference Signal𝑅𝑆𝑅𝑃 =
1
𝐾
P 𝑃QR,.
S
.T"
where, Prs,k is the estimated received power (in Watts) of
the kth Reference Signal Resource element
25. Irfan Ali 25İrfan Ali 25
Measurement 2: Reference Signal Received Quality (RSRQ)
• RSRP does not give an indication of signal quality, i.e. the strength of the reference signal compared
to overall energy in the channel (aka received signal strength indicator (RSSI))
• The RSSI parameter represents the entire received power including the wanted power from the
serving cell as well as all co-channel power and other sources of noise.
• Measuring RSRQ becomes particularly important near the cell edge when decisions need to be
made, regardless of absolute RSRP, to perform a handover to the next cell.
• The maximum value of RSRQ is -3 dB. (One reference signal has 50% energy in the RB)
• The minimum value of reported RSRQ is -19.5 dB. (One reference signal RE has only 1% of energy in
RB)
where NRB is the number of Resource blocks
(NRB= 6 for 1.4MHz Bandwidth)
RSRQ = RSRP
(RSSI / NRB)
7 symbols = 0.5 ms
(Slot)
12subcarriers=180kHz
Resource Elements used
for Reference Signal
RSSI is measured only in OFDM symbol
containing the RS
26. Irfan Ali 26İrfan Ali 26
Summary: DL Radio Frame
Radio Frame
10 ms
Radio Frame
10 ms
System Frame Number
SFN n
System Frame Number
SFN n+1
Frequency
Time
Secondary Synchronization
Signal (SSS)
Physical Broadcast
Channel (PBCH)
Primary Synchronization
Signal (PSS)
62subcarriers
72subcarriers
Physical Downlink Control
Channel (PDCCH)
Physical Downlink Shared
Channel (PDSCH)
3MHz
Cell Reference Signal
Physical Control Format
Indicator Channel (PCFICH)
Physical Hybrid ARQ
Indicator Channel (PHICH)
27. Irfan Ali 27İrfan Ali 27
OFDM in multi-color
Frequency
Time
Secondary Synchronization
Signal (SSS)
Physical Broadcast
Channel (PBCH)
Primary Synchronization
Signal (PSS)
62subcarriers
72subcarriers
Physical Downlink Control
Channel (PDCCH)
Physical Downlink Shared
Channel (PDSCH)
3MHz
Cell Reference Signal
Physical Control Format
Indicator Channel (PCFICH)
Physical Hybrid ARQ
Indicator Channel (PHICH)
Radio Frame
10 ms
Radio Frame
10 ms
28. Irfan Ali 28İrfan Ali 28
References
• Specifications:
Ø TS 36.300: RAN Architecture
Ø TS 36.331: RRC
Ø TS 36.323: PDCP
Ø TS 36.322: RLC
Ø TS 36.321: MAC
• Other References:
Ø LTE in Bullets
Ø www.sharetechnote.com
Ø www.youtube.com/lte4g