This document discusses various topics related to Long Term Evolution (LTE) including call flow, radio link failure, discontinuous reception (DRX), paging, scheduling, random access channel (RACH) procedure, self-organizing networks (SON), and quality of service (QoS). It provides details on the call flow process when a user equipment (UE) is powered on, performs initial cell selection and attachment, and establishes a default bearer. It also describes procedures for radio link failure, DRX, paging, scheduling, RACH, SON functions including self-configuration and optimization, and QoS with default and dedicated bearers.
The document summarizes different 3G events that can trigger handover procedures in UMTS networks. It describes 7 categories of events related to primary pilot channel, frequency, quality, channel traffic volume, CRCs, Rx-Tx parameters, and location/position. Each category contains multiple specific events that are monitored and can trigger handovers based on thresholds being passed for radio frequency parameters. The events monitor factors like signal quality, interference levels, traffic loads, transmission power, and device location to determine when a UE should hand over to a better serving cell.
This document provides guidelines for optimizing 3G networks through neighbor optimization and coverage adjustments. The objectives are to have an optimum number of neighbors to clean up pilot pollution, reduce overshooting, increase capacity, and reduce the possibility of soft congestion conflicts. The methodology involves deleting and adding neighbors based on data from the OSS, as well as adjusting antenna tilting. The optimization sequence is outlined, including guidelines for neighbor deletion, addition of different neighbor types, and planning of the SIB11. The end goal is to have fewer than 36 total neighbors and avoid blocking alarms due to too many neighbors.
In this paper, we discussed about LTE system throughput calculation for both TDD and FDD system.
3GPP LTE technology support both TDD and FDD multiplexing. The paper describes all the factors which affect the throughput like Bandwidth, Modulation, UE category and mulplexing. It also describes how we get throughput 300Mbps in DL and 75Mbps in UL and what are assumptions taken to calculate the same.
Paper describes the steps and formulae to calculate the throughput for FDD system for TDD Config 1 and Config 2.
The throughput calculations shown in this paper is theoretical and limited by the assumptions taken to calculate for calculations
The document discusses LTE network architecture including nodes like the eNodeB, MME, SGW and PGW, and their functions. It also outlines the basic LTE call flows for initial call setup, detach procedures, idle-to-active transitions, and handovers. Key call flow steps include attach request, authentication, context setup, and establishment of bearers between the UE and PDN gateway.
This document discusses network optimization techniques including:
1. Monitoring key performance indicators (KPIs) such as transmitted carrier power, code tree allocation, and channel element allocation to identify issues.
2. Performing analysis of KPIs to locate root causes of failures in specific network elements or cells.
3. Proposing solutions such as adjusting signal transmission power limits, code tree rearrangement, or adding network capacity to address problems identified through monitoring and analysis.
What LTE Parameters need to be Dimensioned and Optimized
How to Dimension user Traffic in 4G networks
What is the best LTE Configuration
Spectrum analysis for LTE System
MIMO: What is real, What is Wishful thinking
LTE Measurements what they mean and how they are used
How to consider Overhead in LTE Dimensioning and What is the impact
How to take into account customer experience when Designing a Wireless Network
It discusses about the 3G call flow scenarios for both the Circuit Switched (CS) and Packet Switched (PS). Calls are mobile originated. Call making and call tear down both are discussed.
1) The document describes key performance indicators (KPIs) for measuring the performance of an LTE radio network. It defines KPIs related to accessibility, retainability, mobility, and latency.
2) Accessibility KPIs measure aspects like call setup success rate, RRC setup success rate, and E-RAB setup success rate. Mobility KPIs evaluate handover success rates within LTE and between LTE and other technologies.
3) Retainability KPIs track metrics such as call drop rate and call setup completion rate. The document also provides details on how to calculate each KPI and which counters are needed to measure the underlying events.
This document provides guidelines for LTE radio frequency (RF) network optimization. It describes the network optimization process including single site verification and RF optimization. Key aspects of RF optimization covered include preparing for optimization by collecting data, analyzing problems related to coverage, signal quality and handover success rate, and adjusting parameters like transmit power, antenna tilts and neighboring cell configurations. Common issues addressed are weak coverage, coverage holes, lack of a dominant cell, and cross coverage between cells. Optimization methods and specific cases are presented to resolve different problems.
The document discusses the challenges of troubleshooting problems that occur before any signaling messages are sent, using the example of a UE that gets stuck at "Searching Network...". It explains that to troubleshoot such issues, one needs in-depth knowledge of the physical layer procedures for initial access, including the Random Access Channel (RACH) process, as well as equipment that can monitor physical layer signaling. It then provides details on the RACH process for LTE, including when it occurs, the contention-based vs. contention-free approaches, preamble structure, and timing of preamble transmission and response.
RRC protocols in LTE help manage radio resources and signaling between the UE and network. Key aspects include:
1. RRC defines two UE states - RRC_CONNECTED for active data transfer and RRC_IDLE for idle/paging.
2. Signaling Radio Bearers (SRBs) carry RRC and NAS messages using different logical channels.
3. System information is broadcast on common channels, informing UEs of network configurations and neighbor cells.
4. Handover between cells is supported through the X2 interface for intra-LTE handovers and inter-RAT handovers to other technologies like UMTS or GSM.
LTE uses various frequency bands and duplexing techniques to provide high-speed data and peak download speeds of up to 300 Mbps. It supports mobility of up to 350 km/h and uses advanced technologies like OFDM, SC-FDMA, MIMO and turbo coding to achieve low latency and high bandwidth. LTE specifications define channel bandwidths of 1.4, 3, 5, 10, 15 and 20 MHz with modulation schemes of QPSK, 16QAM and 64QAM.
This document provides an overview of the LTE1841 Inter Frequency Load Equalization feature. It describes the motivation and goals of the feature, which are to equalize load between inter-frequency cells by maintaining the load difference between partner cells according to a configured delta. The technical details section explains the key aspects of how load is measured and exchanged between cells, how the active mode load equalization state is determined, and the process for candidate UE selection and load equalization execution.
The document discusses the random access channel (RACH) procedure in LTE networks. It covers:
1) The RACH procedure is used for initial access and synchronization between the UE and network. The physical random access channel (PRACH) is used to perform the initial access.
2) The RACH procedure is performed in scenarios like initial access, re-establishment, handover, and when uplink synchronization is lost.
3) The document provides details on the different steps of the contention-based and non-contention based RACH procedures.
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
The document discusses various radio frequency (RF) measurement quantities used in LTE field measurements and optimization, including RSRP, RSSI, RSRQ, and SINR. It defines these terms and explains the relationships between them. For example, it describes how RSRP measures the power of a single resource element while RSSI measures power over the entire bandwidth. It also provides information on how measurement results from different tools can help with RF network optimization.
The document discusses various LTE measurement parameters and procedures including:
1. The eNB reports a list of detected PRACH preambles and measures timing advance, average RSSI, average SINR, UL CSI, and transport BLER for RRM purposes.
2. UE measurements include CQI, RSRP, and RSRQ while eNB measurements include timing advance, RSSI, SINR, UL CSI, detected preambles, and transport BLER. Inter-RAT measurements are also discussed.
3. Examples of RSRP, RSRQ, and timing advance procedures are provided along with CQI measurement details. PLMN selection, cell selection,
1. The document discusses key performance indicators (KPI) for LTE networks in Korea, which has very high standards for call setup success rates, call drop rates, and call completion rates.
2. It provides an overview of the LTE camping procedure, including system selection, cell selection criteria, and different cell categories that UEs can camp on.
3. It explains the LTE random access procedure for both contention-based and non-contention based access, including the four-step process and different preamble formats.
1-NSA Basical Precedure Introduction -trainning 5G RADIO FREQUENCY EMERSON E...EMERSON EDUARDO RODRIGUES
1. The document discusses NSA (non-standalone) architecture and mobility procedures, including SgNB addition, change, and release.
2. It describes the NSA anchoring feature which aims to keep UEs anchored to preferred anchor points as much as possible to improve user experience.
3. Key aspects of EN-DC carrier management and mobility are explained, such as independent anchor selection in both idle and connected modes.
The document summarizes different 3G events that can trigger handover procedures in UMTS networks. It describes 7 categories of events related to primary pilot channel, frequency, quality, channel traffic volume, CRCs, Rx-Tx parameters, and location/position. Each category contains multiple specific events that are monitored and can trigger handovers based on thresholds being passed for radio frequency parameters. The events monitor factors like signal quality, interference levels, traffic loads, transmission power, and device location to determine when a UE should hand over to a better serving cell.
This document provides guidelines for optimizing 3G networks through neighbor optimization and coverage adjustments. The objectives are to have an optimum number of neighbors to clean up pilot pollution, reduce overshooting, increase capacity, and reduce the possibility of soft congestion conflicts. The methodology involves deleting and adding neighbors based on data from the OSS, as well as adjusting antenna tilting. The optimization sequence is outlined, including guidelines for neighbor deletion, addition of different neighbor types, and planning of the SIB11. The end goal is to have fewer than 36 total neighbors and avoid blocking alarms due to too many neighbors.
In this paper, we discussed about LTE system throughput calculation for both TDD and FDD system.
3GPP LTE technology support both TDD and FDD multiplexing. The paper describes all the factors which affect the throughput like Bandwidth, Modulation, UE category and mulplexing. It also describes how we get throughput 300Mbps in DL and 75Mbps in UL and what are assumptions taken to calculate the same.
Paper describes the steps and formulae to calculate the throughput for FDD system for TDD Config 1 and Config 2.
The throughput calculations shown in this paper is theoretical and limited by the assumptions taken to calculate for calculations
The document discusses LTE network architecture including nodes like the eNodeB, MME, SGW and PGW, and their functions. It also outlines the basic LTE call flows for initial call setup, detach procedures, idle-to-active transitions, and handovers. Key call flow steps include attach request, authentication, context setup, and establishment of bearers between the UE and PDN gateway.
This document discusses network optimization techniques including:
1. Monitoring key performance indicators (KPIs) such as transmitted carrier power, code tree allocation, and channel element allocation to identify issues.
2. Performing analysis of KPIs to locate root causes of failures in specific network elements or cells.
3. Proposing solutions such as adjusting signal transmission power limits, code tree rearrangement, or adding network capacity to address problems identified through monitoring and analysis.
What LTE Parameters need to be Dimensioned and OptimizedHoracio Guillen
How to Dimension user Traffic in 4G networks
What is the best LTE Configuration
Spectrum analysis for LTE System
MIMO: What is real, What is Wishful thinking
LTE Measurements what they mean and how they are used
How to consider Overhead in LTE Dimensioning and What is the impact
How to take into account customer experience when Designing a Wireless Network
It discusses about the 3G call flow scenarios for both the Circuit Switched (CS) and Packet Switched (PS). Calls are mobile originated. Call making and call tear down both are discussed.
1) The document describes key performance indicators (KPIs) for measuring the performance of an LTE radio network. It defines KPIs related to accessibility, retainability, mobility, and latency.
2) Accessibility KPIs measure aspects like call setup success rate, RRC setup success rate, and E-RAB setup success rate. Mobility KPIs evaluate handover success rates within LTE and between LTE and other technologies.
3) Retainability KPIs track metrics such as call drop rate and call setup completion rate. The document also provides details on how to calculate each KPI and which counters are needed to measure the underlying events.
This document provides guidelines for LTE radio frequency (RF) network optimization. It describes the network optimization process including single site verification and RF optimization. Key aspects of RF optimization covered include preparing for optimization by collecting data, analyzing problems related to coverage, signal quality and handover success rate, and adjusting parameters like transmit power, antenna tilts and neighboring cell configurations. Common issues addressed are weak coverage, coverage holes, lack of a dominant cell, and cross coverage between cells. Optimization methods and specific cases are presented to resolve different problems.
The document discusses the challenges of troubleshooting problems that occur before any signaling messages are sent, using the example of a UE that gets stuck at "Searching Network...". It explains that to troubleshoot such issues, one needs in-depth knowledge of the physical layer procedures for initial access, including the Random Access Channel (RACH) process, as well as equipment that can monitor physical layer signaling. It then provides details on the RACH process for LTE, including when it occurs, the contention-based vs. contention-free approaches, preamble structure, and timing of preamble transmission and response.
RRC protocols in LTE help manage radio resources and signaling between the UE and network. Key aspects include:
1. RRC defines two UE states - RRC_CONNECTED for active data transfer and RRC_IDLE for idle/paging.
2. Signaling Radio Bearers (SRBs) carry RRC and NAS messages using different logical channels.
3. System information is broadcast on common channels, informing UEs of network configurations and neighbor cells.
4. Handover between cells is supported through the X2 interface for intra-LTE handovers and inter-RAT handovers to other technologies like UMTS or GSM.
LTE uses various frequency bands and duplexing techniques to provide high-speed data and peak download speeds of up to 300 Mbps. It supports mobility of up to 350 km/h and uses advanced technologies like OFDM, SC-FDMA, MIMO and turbo coding to achieve low latency and high bandwidth. LTE specifications define channel bandwidths of 1.4, 3, 5, 10, 15 and 20 MHz with modulation schemes of QPSK, 16QAM and 64QAM.
This document provides an overview of the LTE1841 Inter Frequency Load Equalization feature. It describes the motivation and goals of the feature, which are to equalize load between inter-frequency cells by maintaining the load difference between partner cells according to a configured delta. The technical details section explains the key aspects of how load is measured and exchanged between cells, how the active mode load equalization state is determined, and the process for candidate UE selection and load equalization execution.
The document discusses the random access channel (RACH) procedure in LTE networks. It covers:
1) The RACH procedure is used for initial access and synchronization between the UE and network. The physical random access channel (PRACH) is used to perform the initial access.
2) The RACH procedure is performed in scenarios like initial access, re-establishment, handover, and when uplink synchronization is lost.
3) The document provides details on the different steps of the contention-based and non-contention based RACH procedures.
The document discusses various radio frequency (RF) measurement quantities used in LTE field measurements and optimization, including RSRP, RSSI, RSRQ, and SINR. It defines these terms and explains the relationships between them. For example, it describes how RSRP measures the power of a single resource element while RSSI measures power over the entire bandwidth. It also provides information on how measurement results from different tools can help with RF network optimization.
1.training lte ran kpi & counters rjilSatish Jadav
This document provides an introduction and overview of key performance indicators (KPIs) and associated counters for monitoring the performance of Samsung LTE networks. It describes accessibility KPIs related to session setup success rates, retainability KPIs like call drop rates, integrity KPIs involving throughput measurements, and mobility KPIs covering handover success rates. Formulas for calculating each KPI are provided along with explanations of relevant counters for each performance measurement area.
The document discusses LTE drive test and coverage analysis, including factors that influence LTE coverage, methods for identifying weak coverage areas and coverage holes, techniques for resolving issues like cross coverage and imbalance between uplink and downlink, and case studies on using drive tests to find problems and adjusting antenna parameters to improve coverage. Key aspects of LTE like reference signal power, RSRP measurement, and the differences between TDD and FDD are also explained.
InKnowVision July 2013 HNW Technical PPT - Split DollarInKnowVision
This concept, which most people thought went away ten years ago with changes in the law, is still a very vibrant technique. Pair it with several other techniques for high net worth clients and you have a powerful solution for wealth transfer.
Join us as we look at some of the simple strategies for bringing this particular technique to life and learn how to present it to your clients and planning partners as a significant solution in the wealth transfer arena.
Este documento presenta un diplomado para docentes innovadores que busca mejorar la convivencia escolar utilizando las TIC. Propone tres actividades: 1) crear compromisos entre estudiantes y docentes sobre su función en el aula, 2) realizar talleres para fortalecer valores como el respeto, el diálogo y la tolerancia, y 3) facilitar cuentos sobre valores humanos para que los estudiantes reflexionen y elaboren un reglamento de convivencia para el aula. El objetivo es abordar el mal comportamiento de los estudiantes y foment
El documento resume las principales ideas sobre el negocio 2.0 y las tendencias digitales actuales. Habla sobre el marketing viral, el software libre, los contenidos generados por los usuarios, el conocimiento en la era digital y los mundos virtuales. Concluye diciendo que esto es sólo el comienzo de los cambios que traerá la web 2.0 y las nuevas tecnologías móviles.
The document discusses enabling an agile transformation in an enterprise. It covers principles like individuals and interactions over processes, customer collaboration over contract negotiation, and responding to change over following a plan. It also discusses implementing early and continuous delivery through techniques like test-driven development, continuous integration, continuous delivery, and DevOps. Finally, it provides eight steps to transform an enterprise, including defining business goals, coaching the right people, going deeper before wider, and measuring success.
Millennials (a.k.a. Generation Y, or those born between 1982-2004 ) now comprise the largest generation in the workforce. In fact more than a third of all American workers today are Millennials.
You’ve probably already hired Millennials and will be hiring more. But don’t expect them to stay long. Millennials are twice as likely as 30-somethings to leave a job after just three years, and this gap will only widen with age.
See the infographic on what to expect – and be prepared for – with your growing Millennial workforce.
Este documento habla sobre los trabajadores fijos discontinuos y parciales de Correos en España que llevan años esperando una plaza fija en la empresa desde 2008. Denuncian la inestabilidad laboral que sufren al no saber cuándo ni dónde trabajarán, dificultando la conciliación familiar. También critican los recortes de empleo en Correos que han llevado a la destrucción de más de 15.000 puestos de trabajo y al incumplimiento del servicio postal universal. Reclaman plazas inmediatas para los trabaj
Cgt ,preguntas frecuentes Consolidacion de empleo Cgt Sevilla
El documento proporciona información sobre el proceso de consolidación de empleo temporal en Correos, incluyendo cómo registrarse en línea, los requisitos para participar como completar un formulario en línea y pagar la tarifa dentro del plazo, así como detalles sobre los puestos disponibles, áreas geográficas, méritos y cómo consultar o modificar la solicitud.
InKnowVision November 2012 HNW Marketing PPTInKnowVision
2013 is Poised to be a Banner Year for HNW Planners:
Will you be one of them?
In this 25 minute HNW marketing webinar you will learn:
Why $30M-$49M in net worth is the fastest growing segment
How you can attract these HNW clients
What three new marketing messages you must use in 2013
Why you need to prepare your marketing plan now
InKnowVision October 2013 Case Study - Lewis FWGAInKnowVision
Duncan and Tina are both 65. They live a comfortable lifestyle, spending about $1,600,000 a year after taxes and gifting about $2,000,000 a year to their family foundation. With assets worth approximately $62M and annual income of over $7M, they currently pay just over $2M a year in income taxes and have an increasing estate tax and ongoing income tax exposure.
The primary planning goals are to:
-Make sure that they have sufficient funds to live on for the rest of their lives (approx. $1,600,000/yr. after taxes and gifts).
-Assure that Duncan's, Inc. does not have to be liquidated as a result of their death.
-Provide a successful transition of the business to their son, Jason, while ensuring an equal inheritance for their son, Jeremy. They would like to leave 50% of their estate to Jason & Jeremy and another 25% to their grandchildren and other family members.
-They wish to continue annual giving to their family foundation and ultimately leave 25% of their estate to the foundation at death.
-Make sure the company buy/sell agreement accurately reflects the wishes of the family owners in the most tax efficient manner possible.
-Eliminate or reduce estate taxes.
Keep it Super Simple: Who Said Collecting Data Had to be So HardCleopatra Allen
Do you have good assessment measures? Are they useful? Do you only use rubrics? Would you like to know more about all of the other assessment instruments available? Are you the only person collecting data at the last minute in your department? Do you want some help?
This presentation is designed to provide faculty and staff (i.e., particularly persons responsible for assessment) ideas on how to efficiently and innovatively collect student assessment data. It will provide you with an in-depth understanding of the many tools available to collect data within the natural classroom. In addition, it will help you to understand how to share the assessment load. If you want to understand how to collect meaningful data, you should view this presentation!!! If you want to be efficient and not last minute in collecting data, you should view this presentation!!!!
A business plan canvas specifically tailored to Open Source Projects. Provides a framework for managing your open source project according to Lean Startup methodology. By Eitan Katz and Gaby Fachler.
Este es el examen que se realizó en Correos el 27 de noviembre de 2016.
Es el cuestionario B, idéntico al cuestionario A con la salvedad del orden de las preguntas.
This document contains the resume of Mobeen Ahmed Khan. It lists his contact information and outlines his professional experience working in sales, customer service, and VAS planning roles for Symsoft and CMPAK (ZonG) between 2009-2012. His responsibilities included preparing proposals, managing bids, supporting customers, planning new services, and coordinating with vendors. He has strong skills in technical solutions, communication, and project management, especially within the telecommunications domain.
This document provides an overview of the key components and protocols in 3G and 4G mobile networks. It includes a high-level diagram of the overall 4G architecture and summaries of protocols like S1, X2, NAS, RRC. Key concepts covered include the PDCP, RLC, MAC and PHY layers, QoS classes, paging, attachment, handover procedures between eNodeBs and between 4G and 3G networks.
The document provides an overview of LTE (Long Term Evolution) Release 8. It discusses key requirements for LTE such as supporting high data rates, low latency, and an all-IP network. It describes the network architecture including components like eNodeB, MME, S-GW, and P-GW. It also covers functionality of these components and the protocol stack consisting of PDCP, RLC, MAC, and RRC layers. Mobility management, QoS, and comparisons to other technologies like HSPA+ and WiMAX are also summarized.
This document provides an overview of GSM, GPRS, UMTS, HSDPA and HSUPA protocols and call flows. It describes the protocol stacks and architectures of these mobile communication standards. Key topics covered include physical layer protocols, MAC, RLC, RRC, SNDCP, GTP, MAP, mobility management, call establishment flows and channel types. The document also lists references for further information.
This document provides an overview of two fundamental mechanisms in LTE access networks: random access and buffer status reporting. It describes the random access procedure used by UEs to connect to the network, including the exchange of preambles, responses, and temporary identifiers. It also explains the buffer status reporting procedure, where UEs indicate to the base station the amount of data waiting to be transmitted so that uplink resources can be allocated. Key parameters for both mechanisms are defined in 3GPP specifications to optimize performance and control signaling in the network.
5G PRACH Document-KPIs Improvemnt and understandingQasimQadir3
The document discusses 5G/NR random access channel (RACH) and preamble random access channel (PRACH). It provides the following key points:
1. RACH is used to achieve uplink synchronization between the UE and gNB and obtain resources for Message 3 transmission.
2. PRACH specifically carries the preamble from the UE for uplink synchronization. There are 13 supported preamble formats in 5G/NR with different sequence lengths and time/frequency characteristics.
3. The time-frequency position of the PRACH is determined by factors like frame number, subframe, slot, and occasion number. Zadoff-Chu sequences are used to generate the preambles with parameters like root sequence
The document discusses 5G new radio (NR) physical layer resources including numerology, time-domain resources, frequency-domain resources, and space-domain resources. It provides details on key 5G NR concepts such as subcarrier spacing, symbols, slots and frames. Cyclic prefix length is determined based on subcarrier spacing to maintain consistent overhead. Slot formats in 5G NR provide more flexibility with symbol level uplink/downlink switching compared to LTE.
The document provides an overview of GSM, GPRS, UMTS, HSDPA and HSUPA protocols and call flows. It describes the architecture, interfaces and protocols of each generation at the physical, data link and network layers. Key protocols discussed include LAPD, RR, MM, CM, SNDCP, GTP, RLC, MAC, RRC. Call flows for basic call origination, authentication, data transfer and detach procedures are illustrated for each network. The document also introduces HSDPA and HSUPA enhancements to UMTS such as new channels, scheduling functionality and H-ARQ protocol.
Radio resource management and mobiltiy mngmntabidsyed4u
Radio resource management deals with managing interference, resources, and transmission characteristics in wireless networks. It involves issues around multi-user and multi-cell capacity. Connectivity is provided through bearer services architecture. Static radio resource management involves fixed cell planning including frequency allocation, base station placement, and parameters. Dynamic RRM adapts to traffic load, user positions, mobility, and quality of service using techniques like power control, channel allocation, and handover criteria. Mobility management is handled by the mobility management entity which tracks user location as users move between tracking areas.
lte-enodeb-s1-startup-sib-rrc-connection.pdfJunaid Alam
The document summarizes the sequence of events for an eNodeB performing an S1 setup with the EPC and then initiating broadcasts of system information blocks (SIBs) to UEs. It shows the eNodeB sending the RRC Connection Setup message containing UE specific configuration information. The eNodeB first establishes an S1 connection with the MME and then broadcasts the master information block and various SIBs. It then facilitates the random access procedure and sends the RRC Connection Setup message to the UE.
The document provides an overview of ZigBee/IEEE 802.15.4 wireless technology. It discusses the need for low-power, low-cost wireless connectivity for applications like home automation, medical devices, and industrial sensors. It describes the ZigBee Alliance's role in developing networking and application standards on top of the IEEE 802.15.4 physical radio specification. Key features of ZigBee networks include low power consumption, large network capacity, low data rates, and flexibility for many applications.
This document describes various message types and channels used in LTE networks for communication between the UE, eNB, and MME. It includes:
1. S1AP setup request and response messages exchanged between the eNB and MME to establish transport network connections.
2. RRC connection request messages from the UE to eNB to establish connections, including UE identity information.
3. Descriptions of broadcast, system information, and other channel types used for communication between the UE and eNB, including logical channels mapped to transport channels and physical channels.
WIMAX (Worldwide Interoperability for Microwave Access) is a wireless communication protocol that provides longer range and higher bandwidth than WiFi. It uses a system of towers and receivers to provide internet access to homes and businesses over long distances without wires. WIMAX employs various techniques like ARQ, FEC and H-ARQ to make data transmission over the unreliable airlink more reliable. For ARQ, it uses methods like stop-and-wait, sliding window with go-back-N and selective repeat to handle lost packets. It also uses FEC codes for error correction and H-ARQ combines ARQ and FEC.
WIMAX (Worldwide Interoperability for Microwave Access) is a wireless communication protocol that provides longer range and higher bandwidth than WiFi. It uses base stations and subscriber stations to transmit data over both downlink and uplink connections. WIMAX employs various techniques like ARQ, FEC, and H-ARQ to make data transmission over the unreliable airlink more reliable. For downlink scheduling, WIMAX can use algorithms like weighted round robin, virtual time, and weighted fair queueing to allocate resources according to quality of service parameters.
This document provides an overview of the LTE physical channel structure and procedures between the eNB and UE. It describes the LTE architecture and introduces the main physical channels including downlink channels like PBCH, PDCCH, PDSCH and uplink channels like PUSCH, PUCCH, PRACH. It explains the channel mapping and provides examples of the initial access procedure and synchronization signal transmission. Key concepts covered are radio interface protocol stacks, channel coding, multiple access, and reference signals.
This document discusses WCDMA channels at different levels including logical channels, transport channels, and physical channels. It provides details on:
- Logical channels describe the type of information transferred and include control and traffic channels.
- Transport channels describe how logical channels are transferred over the interface and include dedicated and common channels.
- Physical channels provide the transmission medium and are defined by specific codes. They include channels like DPDCH, DPCCH, PDSCH, PRACH, and CPICH.
- The document also discusses the radio frame structure in WCDMA and details on different physical channel types and their characteristics.
SIB1 provides cell access related information such as PLMN identity, tracking area code, cell identity and access parameters. It is transmitted every 80ms in subframe 5. SIB2 contains radio resource configuration information including access class barring, RACH configuration, timers and power control. It provides parameters for random access, paging, physical channels and uplink power control. SIB1 and SIB2 carry essential system information from the network to user equipment about cell access and configuration.
The document provides an overview of the message flow for a packet switched call between a UE and core network. Key steps include:
1) The UE performs cell search and selection before establishing an RRC connection and registering with the core network.
2) The UE then sends an attach request and exchanges authentication and security messages with the core network.
3) Once attached, the UE can activate a packet data protocol context and exchange user plane data for the packet switched call.
The document provides information about the IEEE 802.11 WLAN standard and its various layers:
- The PHY layer includes the physical layer convergence protocol and physical medium dependent sublayers. The PHY layer supports FHSS, DSSS and infrared spread spectrum techniques.
- The MAC layer supports distributed coordination function based on CSMA/CA and RTS/CTS, as well as point coordination function controlled by an access point. It defines frame formats and medium access mechanisms.
The document discusses various handover procedures in LTE networks, including:
1. Intra-LTE handovers using the X2 interface or S1 interface when the MME and SGW do not change.
2. Inter-MME handovers using S1 that do not change the SGW.
3. Inter-MME/SGW handovers using S1 where both the MME and SGW change.
4. Inter-RAT handovers from LTE to UTRAN Iu mode, which involve reserving resources in the target UTRAN/GERAN network during a preparation phase before executing the handover.
- Orthogonal Frequency Division Multiplexing (OFDM) is a digital multi-carrier modulation technique that divides the available bandwidth into multiple orthogonal subcarriers.
- OFDM provides advantages over traditional Frequency Division Multiplexing (FDM) by making the subcarriers orthogonal, allowing them to overlap without interference and achieving higher spectral efficiency.
- The document provides an example of how OFDM works by taking a bit stream and mapping bits in groups of four to four orthogonal subcarriers at frequencies of 1, 2, 3, and 4 Hz using BPSK modulation before combining them to generate the OFDM signal.
With the rise of data-intensive mobile applications, network operators must find ways to increase network capacity to meet demand. MIMO (Multiple-Input Multiple-Output) techniques, which use multiple antennas at the transmission and reception ends, have the potential to significantly boost network throughput through spatial multiplexing. However, optimizing networks for MIMO's full benefits presents challenges, as MIMO works best under rich scattering conditions and requires accurate measurement of multipath environments. Real-world RF measurements tailored for MIMO networks can help operators overcome these challenges and maximize throughput gains from MIMO without additional spectrum or infrastructure.
This document describes the process of a successful LTE handover from a source eNodeB to a target eNodeB using the X2 interface. It involves measuring signal strengths, selecting a target cell, preparing the target for handover, executing the handover by redirecting data and radio resources to the target, and completing the handover by releasing resources from the source. Key steps include establishing bearers between the target and core network elements like MME and SGW, sending a handover command to the UE, and switching the data path from source to target after handover is completed.
The document describes the 3GPP LTE Radio Link Control (RLC) sub layer. It discusses RLC modes including transparent mode, unacknowledged mode, and acknowledged mode. For each mode it describes functions, state variables, procedures and interfaces. It also covers RLC PDU formats, configurable parameters, and transmission priority policies.
This document discusses the Packet Data Convergence Protocol (PDCP) sublayer in 3GPP LTE networks. It describes the key functions of PDCP including header compression, ciphering, integrity protection, and transmission of user and control plane data. It also explains PDCP's use of ROHC for header compression and the various PDCP protocol data unit formats used for control and user plane messages.
This document discusses the Medium Access Control (MAC) layer in 3GPP Long Term Evolution (LTE) cellular networks. It covers topics such as LTE channel architecture with physical, transport, and logical channels; functions of the MAC layer including mapping channels, error correction, priority handling, and logical channel prioritization; MAC sublayer organization in the downlink and uplink; and downlink and uplink channel types including their purposes and characteristics. Diagrams illustrate the protocol stack and channel relationships.
This document from EventHelix.com provides information about 3GPP LTE channels and the MAC layer. It describes the different logical and transport channels used in LTE, including the functions of the MAC layer such as mapping channels, error correction, and priority handling. Diagrams and explanations are provided for the downlink and uplink channel architectures, as well as the physical layer channels and signaling procedures like random access.
The document describes the LTE RRC connection setup messaging sequence between a UE (user equipment) and an eNodeB (base station). It involves the following steps:
1) The UE initiates a random access procedure by sending a random access preamble to the eNodeB.
2) The eNodeB responds with a random access response assigning the UE a C-RNTI and timing advance value.
3) The UE sends an RRC connection request message using the assigned resources with its UE identity and establishment cause.
4) The eNodeB sends an RRC connection setup message configuring radio bearers.
5) The UE responds with an RRC connection setup complete message
Three UEs (UE-A, UE-B, UE-C) initiate the random access procedure at the same time to connect to the eNodeB. UE-A and UE-B select the same preamble, resulting in a collision. UE-C selects a different preamble. The eNodeB responds to the preambles, assigning resources to UE-A and UE-C. During contention resolution, UE-A's connection request is acknowledged, while UE-B's collides and fails. UE-B then retries the random access procedure with a new preamble.
This document provides an overview of the LTE protocol stack, focusing on the data link layer (L2) which includes the MAC, RLC, and PDCP sublayers. It describes the architecture and functions of MAC including logical and transport channels, HARQ, scheduling, random access procedure, discontinuous reception, and more. It also covers the RLC sublayer including its different modes (TM, UM, AM) and functions like segmentation, reassembly and error correction. Finally it discusses the PDCP sublayer and its roles in header compression, security, and handover support. The document is intended to provide a systematic understanding of the LTE protocol stack for engineers working in areas like development, testing, optimization and trouble
This document discusses downlink physical channels and reference signals in LTE. It describes the functions of channels like the PDCCH, PDSCH, PBCH, and reference signals. It discusses design constraints for cyclic prefix length and subcarrier spacing based on delay spread and Doppler shift. It also summarizes the radio frame structure for different bandwidths and control format indicator values, calculating overhead and peak data rates.
This document provides an overview of the IMS architecture from the perspective of an LTE user equipment. It describes the key components of IMS including the UE, Evolved Packet Core, and IMS core. It also discusses how IMS enables convergence across different access technologies, service types, and network functions to support multimedia services like voice and video over LTE.
The document describes CS fallback procedures for LTE networks, including an immediate-return (IR) scheme and a proposed delayed-return (DR) scheme. The IR scheme has the UE immediately return to LTE after a call is completed, while DR delays the return to avoid unnecessary CS fallbacks if another call is likely. Analytic models are developed to study the performance of IR and DR based on real network measurements. The study finds DR can reduce CS fallback costs by up to 60% compared to IR.
This document provides an overview of channel estimation strategies used in orthogonal frequency division multiplexing (OFDM) systems. It describes the basic types of channel estimation methods: block-type pilot channel estimation and comb-type pilot channel estimation. For block-type estimation, pilots are inserted into all subcarriers of OFDM symbols periodically. This allows estimation of the channel conditions between pilot symbols. Estimation can be done with least squares (LS), minimum mean-square error (MMSE), or modified MMSE. For comb-type estimation, pilots are inserted into certain subcarriers of each symbol, requiring interpolation to estimate data subcarriers. The document compares the implementation complexity and performance of different estimation methods.
The document summarizes key System Information Blocks (SIBs) in LTE. SIB1 contains cell access parameters and scheduling of other SIBs. SIB2 contains radio resource configuration information. SIB3 contains cell reselection parameters for intra-frequency, inter-frequency, and inter-RAT cells. SIBs 4-7 provide additional cell reselection parameters. SIB10-12 contain emergency alerting information for ETWS and CMAS notifications. The SIBs convey important cell and network configuration parameters to help user equipment access the network and perform functions like cell reselection.
The document discusses LTE as the de facto standard for mobile access networks. Key points include:
- LTE is designed for next generation networks and provides all-IP connectivity and consistent experience across access types.
- LTE release 8 supports peak downlink speeds up to 326 Mbps and uplink speeds up to 86 Mbps with 20 MHz bandwidth.
- LTE provides over 4x higher downlink throughput and 5x higher uplink throughput than HSPA+, improved spectrum efficiency, and supports FDD and TDD duplexing and scalable 1.4-20 MHz channel bandwidths.
The document summarizes the signaling flow between an eNodeB and MME during LTE attach and default EPS bearer setup procedures. It includes: (1) UE attach, authentication and security setup; (2) Establishment of two default EPS bearers for two PDNs; (3) Release of UE context due to inactivity and reestablishment using a service request.
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...Neny Isharyanti
Presented as a plenary session in iTELL 2024 in Salatiga on 4 July 2024.
The plenary focuses on understanding and intepreting relevant TPACK competence for teachers to be adept in teaching multimodality in the digital age. It juxtaposes the results of research on multimodality with its contextual implementation in the teaching of English subject in the Indonesian Emancipated Curriculum.
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfJackieSparrow3
we may assume that God created the cosmos to be his great temple, in which he rested after his creative work. Nevertheless, his special revelatory presence did not fill the entire earth yet, since it was his intention that his human vice-regent, whom he installed in the garden sanctuary, would extend worldwide the boundaries of that sanctuary and of God’s presence. Adam, of course, disobeyed this mandate, so that humanity no longer enjoyed God’s presence in the little localized garden. Consequently, the entire earth became infected with sin and idolatry in a way it had not been previously before the fall, while yet in its still imperfect newly created state. Therefore, the various expressions about God being unable to inhabit earthly structures are best understood, at least in part, by realizing that the old order and sanctuary have been tainted with sin and must be cleansed and recreated before God’s Shekinah presence, formerly limited to heaven and the holy of holies, can dwell universally throughout creation
Delegation Inheritance in Odoo 17 and Its Use CasesCeline George
There are 3 types of inheritance in odoo Classical, Extension, and Delegation. Delegation inheritance is used to sink other models to our custom model. And there is no change in the views. This slide will discuss delegation inheritance and its use cases in odoo 17.
Slide Presentation from a Doctoral Virtual Open House presented on June 30, 2024 by staff and faculty of Capitol Technology University
Covers degrees offered, program details, tuition, financial aid and the application process.
Ardra Nakshatra (आर्द्रा): Understanding its Effects and RemediesAstro Pathshala
Ardra Nakshatra, the sixth Nakshatra in Vedic astrology, spans from 6°40' to 20° in the Gemini zodiac sign. Governed by Rahu, the north lunar node, Ardra translates to "the moist one" or "the star of sorrow." Symbolized by a teardrop, it represents the transformational power of storms, bringing both destruction and renewal.
About Astro Pathshala
Astro Pathshala is a renowned astrology institute offering comprehensive astrology courses and personalized astrological consultations for over 20 years. Founded by Gurudev Sunil Vashist ji, Astro Pathshala has been a beacon of knowledge and guidance in the field of Vedic astrology. With a team of experienced astrologers, the institute provides in-depth courses that cover various aspects of astrology, including Nakshatras, planetary influences, and remedies. Whether you are a beginner seeking to learn astrology or someone looking for expert astrological advice, Astro Pathshala is dedicated to helping you navigate life's challenges and unlock your full potential through the ancient wisdom of Vedic astrology.
For more information about their courses and consultations, visit Astro Pathshala.
Join educators from the US and worldwide at this year’s conference, themed “Strategies for Proficiency & Acquisition,” to learn from top experts in world language teaching.
Beyond the Advance Presentation for By the Book 9John Rodzvilla
In June 2020, L.L. McKinney, a Black author of young adult novels, began the #publishingpaidme hashtag to create a discussion on how the publishing industry treats Black authors: “what they’re paid. What the marketing is. How the books are treated. How one Black book not reaching its parameters casts a shadow on all Black books and all Black authors, and that’s not the same for our white counterparts.” (Grady 2020) McKinney’s call resulted in an online discussion across 65,000 tweets between authors of all races and the creation of a Google spreadsheet that collected information on over 2,000 titles.
While the conversation was originally meant to discuss the ethical value of book publishing, it became an economic assessment by authors of how publishers treated authors of color and women authors without a full analysis of the data collected. This paper would present the data collected from relevant tweets and the Google database to show not only the range of advances among participating authors split out by their race, gender, sexual orientation and the genre of their work, but also the publishers’ treatment of their titles in terms of deal announcements and pre-pub attention in industry publications. The paper is based on a multi-year project of cleaning and evaluating the collected data to assess what it reveals about the habits and strategies of American publishers in acquiring and promoting titles from a diverse group of authors across the literary, non-fiction, children’s, mystery, romance, and SFF genres.
Split Shifts From Gantt View in the Odoo 17Celine George
Odoo allows users to split long shifts into multiple segments directly from the Gantt view.Each segment retains details of the original shift, such as employee assignment, start time, end time, and specific tasks or descriptions.
How to Configure Time Off Types in Odoo 17Celine George
Now we can take look into how to configure time off types in odoo 17 through this slide. Time-off types are used to grant or request different types of leave. Only then the authorities will have a clear view or a clear understanding of what kind of leave the employee is taking.
Credit limit improvement system in odoo 17Celine George
In Odoo 17, confirmed and uninvoiced sales orders are now factored into a partner's total receivables. As a result, the credit limit warning system now considers this updated calculation, leading to more accurate and effective credit management.
The membership Module in the Odoo 17 ERPCeline George
Some business organizations give membership to their customers to ensure the long term relationship with those customers. If the customer is a member of the business then they get special offers and other benefits. The membership module in odoo 17 is helpful to manage everything related to the membership of multiple customers.
Webinar Innovative assessments for SOcial Emotional SkillsEduSkills OECD
Presentations by Adriano Linzarini and Daniel Catarino da Silva of the OECD Rethinking Assessment of Social and Emotional Skills project from the OECD webinar "Innovations in measuring social and emotional skills and what AI will bring next" on 5 July 2024
Views in Odoo - Advanced Views - Pivot View in Odoo 17Celine George
In Odoo, the pivot view is a graphical representation of data that allows users to analyze and summarize large datasets quickly. It's a powerful tool for generating insights from your business data.
The pivot view in Odoo is a valuable tool for analyzing and summarizing large datasets, helping you gain insights into your business operations.
1. LONG TERM EVOLUTION 1
TOPICS
● CALL FLOW
● RADIO LINK FAILURE
● DRX ,
● PAGING
● SCHEDULING
● RACH PROCDURE
● SON
● QoS(quality of service)
●
2. LONG TERM EVOLUTION 2
1. CALL FLOW
When UE power switched on :
●
UE scan RSSI (rssi is simply measure the whatever energy/power of frequency
channel) for each and every frequency channel.
● This time UE does not know about network.
● UE make a list and compare with the threshold value.(threshold value is just
depend on UE chipset.not part of 3GPP.
3. LONG TERM EVOLUTION 3
CALL FLOW
UE search pss then ue determine
(a) exact carrier frequency
(b) cyclic prefix length
(c) one out of three PCI group(3*168)
(d) sub frame timing
UE search SSS then ue determine
(a) Frame timing
(b) Exact PCI value from 1 out of 3 group
Now UE decode MIB then UE Determine
(a) SFN,PHICH, bandwidth based on PLMN and PCI ,frequency channel
and ue sim info. UE will figure out the real candidate
Now UE able to read SIB 1.
(a) PLMN ID,TAC,Frequency Band indicator,cell selection info,other SIB's info.
<check cell selection criteria>Decode other SIB's.
RRC RACH procedure..2 types
(a) Contention based.
(b) non contention based
4. LONG TERM EVOLUTION 4
non contention based & Contention based Rach procedure
UE send to ENB RRC connection request.
(a) UE id (S-TMSI) value
(b) random value (0....2^40-1)
(c) stablishment cause
5. LONG TERM EVOLUTION 5
CALL FLOW
● ENB send to UE RRC connection setup
– Radio resource configuration Dedicated
(a) srb to add mod list
(b) drb to add mod list
(c) drb to release list
– MAC main configuration
(a) Sps configuration
– Physical config dedicated
(a) pusch ,pdsch,pucch config dedicated
(b) uplink power control dedicated
(c) CQI reporting
● UE send to ENB RRC connection setup complete + NAS attach request +ESM
(a) Selected PLMN id
(b) Registered MME
(c) Dedicated info NAS
6. LONG TERM EVOLUTION 6
CALL FLOW
ENB send inital UE S1AP message to MME
(a) ENB-UE-S1AP-ID
(b) TAC
(c) Attach request(EPS encryption /intergrity algo. Info.)
(d) connection request ( PDN type)
MME send to HSS AUC. Config request via Diameter protocol
(a) command code ,application ID,user name ,RAT type ,visited PLMN id .
HSS response to MME via diameter protocol
(a) result code success,subscriber status, APN config. Info
MME send DL NAS Transport s1ap to ENB
(a) MME-UE-S1AP-ID
(b) ENB-UE-S1AP ID
(c) Rand value,auc no.& key selection id also include in this message
7. LONG TERM EVOLUTION 7
CALL FLOW
● ENB send RRC DL info tranfer to UE
There are three main componenet of this authentication process
(a) input parameter (b) authentication algo (c)output value
Both ue and enodeB use same input and same authentication algo for same output value either
its fail
● UE send RRC UL info transfer to ENB
(a) security header type
(b) EPS mobility management protocol
(c) security mode complete message id
● ENB send UL NAS Transport s1ap to MME
(a) MME-UE-S1AP ID
(b) ENB-UE-S1AP ID
(c) Ue send RES value back to MME,TAC.
8. LONG TERM EVOLUTION 8
CALL FLOW
● MME send a create session request to SGW,SGW forward to PGW
(a) MME initiate the default route establishment by asking the SGW to create a GTP tunnel.
Message contains
(b) RAT type,PDN type,bearer context ,MS-ISDN,TAI,PGW S5/S8 address,APN address
allocation
● MME send A S1AP Initial context setup request +NAS attach accept+activate
default bearer request to ENB
This message contains
(a) MME-UE-S1AP ID,ENB-UE-S1AP ID,AMBR,E-RAB to be setup,UE security capability
(b) EPS attach,TAI list ,GUTI,GPRS ready timer
(c) EPS bearer id ,EPS QoS,access point name ,PDN address
● ENB send a AS security mode command to UE
(a) This is the same step as NAS security mode command the only diffrence is
Its only for RRC.(integrity & ciphering algo info).
9. LONG TERM EVOLUTION 9
CALL FLOW
● ENB send a initial context setup response S1AP to MME
(c) MME-UE-S1AP ID
(b) ENB-UE-S1AP ID,
(a) E-RAB setup list
● Complete attach and Default bearer activation
(a) ENB transport attach complete and bearer accep the message was
received from ue .
10. LONG TERM EVOLUTION 10
RADIO LINK FAILURE
●
Radio link failure means UE suddenly lost the connection with the network in other words
“break physical layer”. when UE is in connected state .
●
When RLF happens ;
●
Layer 1 monitors down link quality and report problem to RRC.
●
RRC filter L1 indicates and start a timer .
●
If no recovery then layer 2 monitors random access attempts and indicate problem to RRC
●
If no recovery then possible recovery through an RRC connection Re-establishment
procedure .
●
Re-establishment may be performed in any cell to which the UE”s context is made available .
●
If no recovery then UE go back into IDLE state.
11. 11
DRX
DRX functionality that controls UE’s PDCCH monitoring activity.
If DRX is configured the UE is allowed to
monitor PDCCH discontinuously .
DRX Cycle specifies the periodic repetition
of the on-duration followed by a possible
period of inactivity .
DRX Inactivity Timer :
Specifies the number of consecutive PDCCH sub frame(s) after successfully decoding a PDCCH
indicating an initial UL or DL user data transmission
DRX Re transmission Timer :
Specifies the number of consecutive PDCCH sub frame(s) for as soon as DL retransmission is
expected by the UE .
DRX Short Cycle Timer: UE should follow the DRX short cycle timer after the inactivity timer has
expired.
On Duration Timer: Specifies the number of consecutive PDCCH sub frame(s) at the beginning of
DRX cycle.
12. 12
PAGING
Paging is a network initiated connection setup .
Paging relies on PDCCH ,monitored at predefined time according to DRX cycle .
If the UE detect its Paging group ID on PDCCH ,its demodulate and decode the PDSCH and forward
the decoded data on PCH to MAC layer the PCH transport block contains the exact identity of the
terminal being paged.
Paging can be used for :
(1) To initiate mobile terminated to PS call
(2) To initiate mobile terminated to CSFB call
(3) To re-acquire system info.
(4) To provide ETWS notification.
There are also two more concept in paging which is :
Paging Occasion (PO): is a sub frame where there may be P-RNTI transmitted on PDCCH
addressing the paging message .
Paging Frame (PF): is a one radio frame ,which may contains one or multiple paging occasions .
13. LONG TERM EVOLUTION 13
MAC
● Scheduling types
1. Dynamic scheduling
2. Persistence scheduling
3. Semi-persistence schuding
1. The first OFDMA symbol in each
and every subframe consist of a CFI
information.CFI info. Basically tells
about how many OFDMA symbol
used by PDCCH .PDCCH has DCI
Information with the help of DCI
UE decode the data from PDSCH.
now when UE download a set of file from the internet ,each and every subframe has PCFICH and
PDCCH data in first 3-4 symbol.the data is robust and adaptive in nature when its web data so its
essential to send control information in each sub frame along with it this type of scheduling is called
dynamic scheduling.
14. LONG TERM EVOLUTION 14
MAC
2. Persistence scheduling :
Consider a case where a voice data in the form of small packets and it comes in a regular
interval. which is network dependent, sending a control information of every subframe plays a
vital role in the bandwidth utilization. This kind of scheduling is called persistance scheduling where
the control information sent across the subframe is retained for every nth subframe coming after it
until unnotified.
3. Semi Persistence Scheduling :
In order to support more allocation
without increase in the size of PDCCH
, SPS can be used. UE is pre
configured by the ENB with in
SPS-RNTI and a periodicity.
Once its preconfigured UE will
Recieve allocation using sps-RNTI
instead of C-RNTI.
15. LONG TERM EVOLUTION 15
HARQ
● HARQ is a combination of high-rate forward error-correcting coding and ARQ is a error control
for detectable-but-uncorrecttable errors.
● In HARQ a code is used that can perform both forward error correction (FEC) in addition to
error detection (ED) such as reed solomon code , convolutional code or turbo code.
● Round trip timing is 8ms
● HARQ only support DLSCH and ULSCH
● Multiple 8 parallel stop and wait process
● Asynchronous Protocol : - No fixed timing relationship between DL packet transmited and the
ACK/NACK sent by UE.
● Synchronous Protocol :- Fixed timing relationship between dl packet transmitted and
ACK/NACK sent by UE .
● Adaptive Protocol :- the frequency location and the more detailed transmission format can be
changed between transmission.
● Non Adaptive Protocol :- retransmission must occur at the same frequency resource and with
the same transmission formate as the initial transmission.
16. LONG TERM EVOLUTION 16
RACH Procedure
● Objective :- its for UL synchronization and also get unique identity to UE and timing correction
information for uplink
● Two Types :
(1) Contention(collision) based
(a) RRC idle to RRC connected
(b) UL data transfer(synchronization lost)
(c) RRC connection re-establishment
(2) Non-Contention(non-collision) based :-
(a) intra sys handover
(b) DL data arrival(synchronization lost)
● Contention based :-
Step 1:- Random acess preamble transmission
Network broadcast info to all UE s.
17. LONG TERM EVOLUTION 17
RACH Procedure
● preamble transmission info. allowed in SIB 2.in each cell there are 64 preamble sequence
available.UE randomly select a 1 sequence,transmission of random acess preamble for ENB to
estimate the UE transmission timing .power ramping can be applied until preamble is received .
● Step 2 :- Random Access Response
After ENB detect the preamble it send a transmission on PDCCH identified using RA-RNTI.
Actual RAR is on PDCCH pointed by PDCCH with RA-RNTI.
Message contains index of the random acess preamble ,timing correction calculated at the
network,temporary identity TC-RNTI.
● Step 3 :- Terminal Identification
● UE adjust timing correction info. UE start a contention resolution timer , each UE will transfer it
unique UL-CCCH SDU on ULSCH transmitting the uplink message.its allow to use HARQ to
enhance receiving performance.
● Step 4:- Contention Resolution
ENB will only receive ULSCH from UE those timing adjustment was suitable . Then ENB send a
PDCCH with a TC-RNTI orignally included in RAR and then the contention message on PDSCH
where a contention resolution id which match the CCCH SDU of only of the UE s is included.
each UE receiving the downlink message will compare the contention resolution id. Only UE
which observe a match between the ID received in contention resolution and the CCCH SDU
will declare the random access procedure successfull.
18. LONG TERM EVOLUTION 18
RACH Procedure
● Non Contention Based :-
● Step 1:- random access preamble assignment via
dedicated signaling in DL .
● Step 2 :- random access preamble on PRACH
in uplink. Power ramp can be applied until
preamble is received.the amount of power
increase is depend on .
● Step 3 :- ENB send a transmission on pdcch idntified
using RA-RNTI actual RAR is on pdsch pointed by
PDCCH with RA-RNTI ,no HARQ,RAR include
RA preamble ID .If UE find the same preamble id in RAR .
UE consider random access response was successful.
19. LONG TERM EVOLUTION 19
SON
SON aim to configure and optimize the network automatically so that the human intraction can be
reduce and the capacity of network should be increase.
Main functions of SON
Self Configuration
Self Optimization
Self Healing
● Self configure :- where newly deployed ENB are configure by automatic installation. process is ...
● An ip address allocated to newly deployed ENB and the information of self configuration sub system
of OAM is given to the ENB.
● A gate way is configure to newly deployed ENB so that the ENB can exchange IP packet with other
internet nodes.
● ENB provides its information including type hardware etc to the self configuration sub-system for
authentication purpose .
● The new ENB is configured based on the transport and radio configuration data .
● The new ENB connect to the normal OAM sub system to the other management system.
20. LONG TERM EVOLUTION 20
SON
● Self Optimization :- Is a process where UE & ENB measurement and performance
measurement are used to auto-tune the network.its start when RF interface is switch on its
collects UE & ENB measurement information and then with the help of external optimization
tool.it auto tune the configure data to optimize the network.
● Self Healing :- Its aim at automatic detection and localization of most of the failure and applies
self healing mechanism to solve several failure classes.
● SON Architechture :- it can be divided into three classes
(a) Centralised SON
(b) Distributed SON
(c) Hybrid SON
● SON use case :-
● ANR
● Coverage and Capacity optimization
● Mobility Roboust optimization
● Mobility Load Balancing Optimization etc.
21. QoS
In LTE Quality of service is applied on radio bearer .
In LTE QoS applied on two types of radio bearer Dedicated bearer and Default bearer.
Default Bearer : when UE attach to the network for the first time it will be assigned default
bearer which remains as long as UE attached . each default bearer comes with an IP
address ,UE can have additional default bearer as well . each default bearer will have a
separate IP address. default bearer only Non GBR . QCI (5-9) assigned to default bearer .
Non GBR does not provide a guaranteed bit rate
Parameter of default bearer : APN-AMBR,UE-AMBR,APN ,IP address,ARP.
APN-AMBR : is the max. allowed total Non-GBR through put to specific APN.
UE-AMBR: is max. allowed total Non-GBR throughput among all APN to a specific UE.
ARP: allocation and retention priority is basically used for deciding whether new bearer
modification or establishment request should be accepted.
22. QoS
Dedicated Bearer : dedicated bearer provides dedicated tunnel to one or more specific traffic
(i.e. voip ,video,etc) dedicated bearer acts as an additional bearer on top of the default
bearer .its does not require a separate IP address .due to the fact only additional default
bearer need an IP address and dedicated bearer always linked to one of the default bearer
established previously .
Dedicated bearer can be sub divided into GBR QCI (1-4) or Non GBR (5-9).
Parameter of dedicated bearer:
Non-GBR: APN-AMBR,UE-AMBR,TFT,ARP,L-EBI.
GBR: GBR,MBR,TFT,ARP,L-EBI.
GBR: Provide guaranteed bit rate per EPS bearer .specified independently for UL/DL.
MBR: The maximum guaranteed bit rate per EPS bearer .specified independently for UL/DL
Traffic Flow Template (TFT) : its always associated with dedicated bearer and while default
bearer may or may not have TFT.
23. QoS
TFT define rules so that UE and network knows which IP packet should be sent on particular
dedicated bearer .its usually has rules on the basis of IP packet destination /source or
protocol used.
L-EBI : Its stands for linked EPS bearer ID .each dedicated bearer always linked to one of
default bearer .L-EBI tells dedicated bearer which default bearer it is attached to.