SlideShare a Scribd company logo
1 of 20
Network Entry Success Rate – An overview
10th August 2010
Overview
• Network Entry Success Rate (NESR) is one of the
KPI’s dealing with Network accessibility
• NESR determines what percentage of network
entry attempts are successful and results in
access to the network
• It is very important to understand what
constitutes the formulation of the KPI
NESR - Breakdown
• Network Entry can be broadly divided into the following categories:
1. System Acquisition and Network Selection
2. Establishing RF link
3. Authentication and Key Generation
4. Registration
5. Setup of Pre-Provisioned Service Flows
6. IP Assignment
7. Data Exchange
• The user’s equipment goes though each of these steps before it can
access the network
• Network Entry failure can occur at any of the aforementioned step
Flow Diagram
System Acquisition and
Network Selection
• On power up the SS scans for the preamble. From this the SS learns the
basic frame timing of the target base station
• Once preamble is acquired it can start to decode the broadcast
configuration messages
• The SS needs to read the different broadcast information of a cell,
specifically the DCD, UCD, DL-MAP and UL-MAP-messages
• The first stage is to read the Frame Control Header (FCH). This provides
information to decode the DL-MAP, which specifies the location of the DCD
and UCD
• The SS reads the Operator ID from either DL-MAP or DCD, and checks
whether the operator is part of its preferred list. If so, it is selected and SS
is DL synchronized
• SS reads the UL-MAP, which carries information defining the availability of
the ranging channels and the UCD, which has the definition of the ranging
code values
Continued
Establishing RF link
• Once network selection is completed, the SS is now ready
to start establishing the RF link with the site.
• Naturally, this link is made with the best server and the
steps that follow are divided into three broad categories.
1. Ranging
2. Capability Negotiation
3. Power Control (switching to open loop power control)
Ranging:
• At this point, the SS is “DL Synchronized” and is to obtain “UL Synchronization”.
• Initial ranging consists randomly selecting from common ranging resources.
• The resources are available to all users and the process is contention based
which may result in collisions.
• Initial Ranng giprocess includes steps to mitigate the effects of such collisions.
• SS will identify itself to the network using its 48–bit MAC address.
• It will be allocated its Basic and Primary Management CIDs.
• These CID’s are used to exchange MAC signaling messages to complete the
network entry procedure.
• The ranging process achieves three important objectives:
– The SS achieves time-alignment with the BS in the uplink.
– SS transmit power is adjusted to take into account the distance of the SS from the BS
– The transmit frequency of the SS is “fine tuned” to best match with the BS.
Continued
Ranging - Continued
Capability Negotiation:
• It is essential that the capabilities of that SS are known to the network.
• On completion of ranging, it will immediately notify the BS of its basic
capability set, including various Physical and MAC layer parameters to
complete Authentication and Registration.
• The BS will determine the capabilities that are supported by both, SS and
the BS, and sends a list of the common capabilities back to the SS
Continued
Authentication and Key
Generation
• Before the SS can initiate services, it must authenticate itself to the
network.
• As part of the authentication procedures, security keys are generated
independently at the AAA server and the SS and these are used to create
the security keys used on the air interface and for IP sessions.
• The most popular authentication method currently in use with EAP is
Transport Layer Security (TLS).
• EAP-TLS is based upon using Digital Certificates as the credentials for
authentication and Public Key Infrastructure (PKI) for the secure exchange
of authentication information.
Registration
• After authentication, the SS registers with the network so that SS
informs how it wishes to interact with the network, and the
network provides network-specific mobility parameters for the SS
to use.
• This message will carry the SS supported capabilities (such as CS
capabilities, Mobility parameters and Handover support, etc.).
Registration
Setup of Pre-Provisioned
Service Flows
• After registration is completed, the mobile must obtain an IP address. To
do this, the SS must first have a service flow to use for the IP session
traffic and to carry the IP management messages.
• AT this point, the network will initiate the Initial Service Flows and
optionally, a number of pre-provisioned services flows (to carry data)
based on the subscribers profile.
• The indicated procedure is always initiated by the BS or rather the ASN-
GW based on the user profile which is downloaded from the AAA-server of
that SS during network entry
Continued
IP assignment
• The ISF or other pre-provisioned service flows and related CIDs
will be used for IP messages to obtain a dynamic IP address for
the SS, from the CSN.
• Prior to initiating any data transfer services, the SS must be
allocated an IP address. It is possible for the SS to hold a static IP
address, but it is more likely that an address will be allocated
dynamically by the CSN.
• If the SS operates in Simple IP mode, it uses DHCP to obtain its
IP Address. This is done by exchanging DHCP messages with the
DHCP Server located in the CSN. These messages are IP based,
and usethe ISF created during the Pre-provisioned Service Flow
creation described in the previous section.
Continued
Data Exchange
• The data is transferred to the SS almost
instantaneously because the SS continuously
listens to the DL-MAP-messages in normal
operation mode.
• The SS just listens to the downlink broadcast
messages, namely the DL-MAP messages in the
consecutive frames.
• Eventually, the BS receives DL-data for that SS.
Continued
Thank you!

More Related Content

What's hot

Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
phanleson
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7
Tutun Juhana
 

What's hot (20)

C C N A Day3
C C N A  Day3C C N A  Day3
C C N A Day3
 
Group 1
Group 1Group 1
Group 1
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
Routing
RoutingRouting
Routing
 
routing
routingrouting
routing
 
Academic Experiment 2 - IP forwarding
Academic Experiment 2 - IP forwarding Academic Experiment 2 - IP forwarding
Academic Experiment 2 - IP forwarding
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7
 
Equal Cost Multipath Routing in FOKUS OpenSDNCore
Equal Cost Multipath Routing in FOKUS OpenSDNCoreEqual Cost Multipath Routing in FOKUS OpenSDNCore
Equal Cost Multipath Routing in FOKUS OpenSDNCore
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Day 9 routing
Day 9 routingDay 9 routing
Day 9 routing
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
 
SCE 2
SCE 2SCE 2
SCE 2
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Network switch
Network switchNetwork switch
Network switch
 
T Tcp
T TcpT Tcp
T Tcp
 
Routing
RoutingRouting
Routing
 
Deployment guide1
Deployment guide1Deployment guide1
Deployment guide1
 
Transport Layer [Autosaved]
Transport Layer [Autosaved]Transport Layer [Autosaved]
Transport Layer [Autosaved]
 

Similar to Network entry success rate

Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01
Gaurav Goyal
 

Similar to Network entry success rate (20)

Osi layer model
Osi layer modelOsi layer model
Osi layer model
 
Client Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptxClient Server Network and Peer to Peer.pptx
Client Server Network and Peer to Peer.pptx
 
08 coms 525 tcpip - tcp 1
08   coms 525 tcpip - tcp 108   coms 525 tcpip - tcp 1
08 coms 525 tcpip - tcp 1
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 
SDN & NFV.pptx
SDN & NFV.pptxSDN & NFV.pptx
SDN & NFV.pptx
 
UNIT-3 (2).pptx
UNIT-3 (2).pptxUNIT-3 (2).pptx
UNIT-3 (2).pptx
 
Presentation of computer network on data link layer
Presentation of computer network on data link layerPresentation of computer network on data link layer
Presentation of computer network on data link layer
 
Unit03
Unit03Unit03
Unit03
 
ACE - Comcore
ACE - ComcoreACE - Comcore
ACE - Comcore
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
CN Unit 2 PPT.pptx
CN Unit 2 PPT.pptxCN Unit 2 PPT.pptx
CN Unit 2 PPT.pptx
 
Sonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportSonali Bank Network Design Project Report
Sonali Bank Network Design Project Report
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214
 
27 Switching.pptx
27 Switching.pptx27 Switching.pptx
27 Switching.pptx
 
Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
Atm intro
Atm introAtm intro
Atm intro
 
transport layer
transport layer transport layer
transport layer
 
ITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdfITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdf
 

More from Shiraz316

More from Shiraz316 (20)

FINGERNAIL DISORDER DETECTION FOR DISEASE ANALYSIS
FINGERNAIL DISORDER DETECTION FOR DISEASE ANALYSISFINGERNAIL DISORDER DETECTION FOR DISEASE ANALYSIS
FINGERNAIL DISORDER DETECTION FOR DISEASE ANALYSIS
 
K neareast neighbor algorithm presentation
K neareast neighbor algorithm presentationK neareast neighbor algorithm presentation
K neareast neighbor algorithm presentation
 
Khi 087 revised dt report
Khi 087 revised dt reportKhi 087 revised dt report
Khi 087 revised dt report
 
Khi 117 revised dt report
Khi 117 revised dt reportKhi 117 revised dt report
Khi 117 revised dt report
 
Khi 164 revised dt report
Khi 164 revised dt reportKhi 164 revised dt report
Khi 164 revised dt report
 
Khi 054 revised dt report
Khi 054 revised dt reportKhi 054 revised dt report
Khi 054 revised dt report
 
Khi 061 revised dt report
Khi 061 revised dt reportKhi 061 revised dt report
Khi 061 revised dt report
 
Khi 022 revised dt report
Khi 022 revised dt reportKhi 022 revised dt report
Khi 022 revised dt report
 
Khi 113 revised dt report
Khi 113 revised dt reportKhi 113 revised dt report
Khi 113 revised dt report
 
Khi 156 revised dt report
Khi 156 revised dt reportKhi 156 revised dt report
Khi 156 revised dt report
 
Khi 142 revised dt report
Khi 142 revised dt reportKhi 142 revised dt report
Khi 142 revised dt report
 
Khi 316 revised dt report
Khi 316 revised dt reportKhi 316 revised dt report
Khi 316 revised dt report
 
Khi 186 revised dt report
Khi 186 revised dt reportKhi 186 revised dt report
Khi 186 revised dt report
 
Khi 052 revised dt report
Khi 052 revised dt reportKhi 052 revised dt report
Khi 052 revised dt report
 
Khi 151 revised dt report
Khi 151 revised dt reportKhi 151 revised dt report
Khi 151 revised dt report
 
Khi 150 revised dt report
Khi 150 revised dt reportKhi 150 revised dt report
Khi 150 revised dt report
 
Khi 078 revised dt report
Khi 078 revised dt reportKhi 078 revised dt report
Khi 078 revised dt report
 
LTE quick introduction session Training
LTE quick introduction session TrainingLTE quick introduction session Training
LTE quick introduction session Training
 
LTE Sales Training for CPE Device
LTE Sales Training for CPE DeviceLTE Sales Training for CPE Device
LTE Sales Training for CPE Device
 
Witribe Customer Premises Equipment Training for LTE
Witribe Customer Premises Equipment Training for LTEWitribe Customer Premises Equipment Training for LTE
Witribe Customer Premises Equipment Training for LTE
 

Recently uploaded

一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
F
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
AS
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
c6eb683559b3
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
AS
 
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
mikehavy0
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
AS
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
AS
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
ayvbos
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
AS
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
F
 

Recently uploaded (20)

Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
 
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxA LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
 
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 

Network entry success rate

  • 1. Network Entry Success Rate – An overview 10th August 2010
  • 2. Overview • Network Entry Success Rate (NESR) is one of the KPI’s dealing with Network accessibility • NESR determines what percentage of network entry attempts are successful and results in access to the network • It is very important to understand what constitutes the formulation of the KPI
  • 3. NESR - Breakdown • Network Entry can be broadly divided into the following categories: 1. System Acquisition and Network Selection 2. Establishing RF link 3. Authentication and Key Generation 4. Registration 5. Setup of Pre-Provisioned Service Flows 6. IP Assignment 7. Data Exchange • The user’s equipment goes though each of these steps before it can access the network • Network Entry failure can occur at any of the aforementioned step
  • 5. System Acquisition and Network Selection • On power up the SS scans for the preamble. From this the SS learns the basic frame timing of the target base station • Once preamble is acquired it can start to decode the broadcast configuration messages • The SS needs to read the different broadcast information of a cell, specifically the DCD, UCD, DL-MAP and UL-MAP-messages • The first stage is to read the Frame Control Header (FCH). This provides information to decode the DL-MAP, which specifies the location of the DCD and UCD • The SS reads the Operator ID from either DL-MAP or DCD, and checks whether the operator is part of its preferred list. If so, it is selected and SS is DL synchronized • SS reads the UL-MAP, which carries information defining the availability of the ranging channels and the UCD, which has the definition of the ranging code values
  • 7. Establishing RF link • Once network selection is completed, the SS is now ready to start establishing the RF link with the site. • Naturally, this link is made with the best server and the steps that follow are divided into three broad categories. 1. Ranging 2. Capability Negotiation 3. Power Control (switching to open loop power control)
  • 8. Ranging: • At this point, the SS is “DL Synchronized” and is to obtain “UL Synchronization”. • Initial ranging consists randomly selecting from common ranging resources. • The resources are available to all users and the process is contention based which may result in collisions. • Initial Ranng giprocess includes steps to mitigate the effects of such collisions. • SS will identify itself to the network using its 48–bit MAC address. • It will be allocated its Basic and Primary Management CIDs. • These CID’s are used to exchange MAC signaling messages to complete the network entry procedure. • The ranging process achieves three important objectives: – The SS achieves time-alignment with the BS in the uplink. – SS transmit power is adjusted to take into account the distance of the SS from the BS – The transmit frequency of the SS is “fine tuned” to best match with the BS. Continued
  • 10. Capability Negotiation: • It is essential that the capabilities of that SS are known to the network. • On completion of ranging, it will immediately notify the BS of its basic capability set, including various Physical and MAC layer parameters to complete Authentication and Registration. • The BS will determine the capabilities that are supported by both, SS and the BS, and sends a list of the common capabilities back to the SS Continued
  • 11. Authentication and Key Generation • Before the SS can initiate services, it must authenticate itself to the network. • As part of the authentication procedures, security keys are generated independently at the AAA server and the SS and these are used to create the security keys used on the air interface and for IP sessions. • The most popular authentication method currently in use with EAP is Transport Layer Security (TLS). • EAP-TLS is based upon using Digital Certificates as the credentials for authentication and Public Key Infrastructure (PKI) for the secure exchange of authentication information.
  • 12. Registration • After authentication, the SS registers with the network so that SS informs how it wishes to interact with the network, and the network provides network-specific mobility parameters for the SS to use. • This message will carry the SS supported capabilities (such as CS capabilities, Mobility parameters and Handover support, etc.).
  • 14. Setup of Pre-Provisioned Service Flows • After registration is completed, the mobile must obtain an IP address. To do this, the SS must first have a service flow to use for the IP session traffic and to carry the IP management messages. • AT this point, the network will initiate the Initial Service Flows and optionally, a number of pre-provisioned services flows (to carry data) based on the subscribers profile. • The indicated procedure is always initiated by the BS or rather the ASN- GW based on the user profile which is downloaded from the AAA-server of that SS during network entry
  • 16. IP assignment • The ISF or other pre-provisioned service flows and related CIDs will be used for IP messages to obtain a dynamic IP address for the SS, from the CSN. • Prior to initiating any data transfer services, the SS must be allocated an IP address. It is possible for the SS to hold a static IP address, but it is more likely that an address will be allocated dynamically by the CSN. • If the SS operates in Simple IP mode, it uses DHCP to obtain its IP Address. This is done by exchanging DHCP messages with the DHCP Server located in the CSN. These messages are IP based, and usethe ISF created during the Pre-provisioned Service Flow creation described in the previous section.
  • 18. Data Exchange • The data is transferred to the SS almost instantaneously because the SS continuously listens to the DL-MAP-messages in normal operation mode. • The SS just listens to the downlink broadcast messages, namely the DL-MAP messages in the consecutive frames. • Eventually, the BS receives DL-data for that SS.