SlideShare a Scribd company logo
1 of 31
LTE Basic
Procedures
From cell search to context
establishment
Attach and default bearer activation message flow – part 1
Cell Search
 the mobile device performs a full search
Voice-centric devices might start their search
on GSM bands first as such networks are the
most widely deployed and hence there is the
highest probability to find a cell of a suitable
network there.
LTE devices that are more data centric might
start the search by looking for LTE cells and
fall back to UMTS and GSM cell search if not
successful
Cell Search
 First step
the mobile device searches on all channels in
all supported frequency bands for an initial
signal
tries to pick up a primary synchronization
signal (PSS)
 PSS is broadcasted every 5 milliseconds
 twice per air interface frame
Cell Search
 Second step
the device remains on the channel
locates the secondary synchronization signal
(SSS)
 which is also broadcast once every 5 milliseconds
 While the content of the PSS is always the same,
the content of the SSS is alternated in every frame
 the mobile device can detect from the pattern as to
where to find the beginning of the frame
Cell Search
Cell Search
 To make cell detection easier, the PSS
and SSS are broadcast only on the inner
1.25MHz of the channel, irrespective of
the total channel bandwidth. This way, a
simpler FFT analysis can be performed to
detect the signals. Also, the initial cell
search is not dependent on the channel
bandwidth. Hence, this speeds up the cell
search process.
Cell Search
 The primary and secondary
synchronization signals implicitly contain
the PCI.
The PCI is simply a lower layer physical
identity of the cell
The PCI is important to distinguish
neighboring cells transmitting on the same
frequency
 especially in cell edge scenarios
Cell Search
 After detection of the PSS and SSS, the
mobile device is also aware if the cell uses
a normal or an extended cyclic prefix
 The signals transmitted from the different
cells on the same channel interfere with
each other
Cell Search
 In case the mobile device has found the
cell described on the SIM card after power
up
it may go directly to this cell
stop searching for other cells on different
channels in the current frequency band
 even if the cell is not the strongest on the current
channel.
After a successful attach procedure
 the cell reselection mechanism or a handover will
ensure that the mobile device is served by the
strongest cell it receives
Cell Search
 The next step in the cell search procedure
Read the MIB from the PBCH
 Broadcast every 40 milliseconds in the inner
1.25MHz of the channel
 The MIB contains the most important information
about the configuration of the channel
 Very conservative modulation and strong error detection
and correction information is added to allow successful
decoding of this information even under very unfavorable
reception conditions
Cell Search
 The first information that the mobile device gets
from the MIB is the total bandwidth used for the
channel since all decoding attempts so far were
only performed in the inner 1.25MHz of the
channel
 Further, the MIB contains the structure of the
HARQ indicator channel and the System Frame
Number (SFN)
 for ciphering and calculation of paging opportunities
Cell Search
 With the information from the MIB, the
mobile device can then begin to search for
the SIB-1.
Broadcast on the downlink shared channel
every 80 milliseconds
the mobile device needs to decode the
‘common’ search space in the control region
of a subframe to find a downlink control
channel (PDCCH) message
 announces the presence and location of the SIB-1
in the subframe.
Cell Search
 SIB-1 message contains the following
information
MCC and MNC of the cell
 MCC: Mobile Country Code
 MNC: Mobile Network Code
 These parameters tell the mobile device if the cell
belongs to the home network or not
NAS cell identifier
 similar to the cell-ID in GSM and UMTS
Tracking Area Code (TAC)
 corresponds to the location and routing areas in
GSM and UMTS
Cell Search
Cell barring status
 whether the cell can be used or not.
Minimum reception level (q_RxLevMin)
 If the level is lower
 the mobile device must not try to establish
communication with the cell
A scheduling list of other SIBs
 With the information provided in SIB-1
the mobile device can decide if it wants to
start communicating with this cell
Cell Search
 SIB-2 contains further parameters that are
required to communicate with a cell
the configuration of the RACH
the paging channel configuration
the downlink shared channel configuration
the PUCCH configuration;
the SRS configuration in the uplink;
uplink power control information;
timers and constants (e.g. how long to wait for
an answer to certain messages, etc.);
uplink channel bandwidth.
Attach and default bearer activation message flow – part 1
Attach Procedure
 Once the mobile device has all the
required information to access the network
MIB
SIB-1
SIB-2…
 Attach procedure
Deliver an IP address
 The mobile device is then able to send and receive
data from the network
Attach Procedure
First: request resources on the uplink shared
channel
 A request on the RACH
 To let the mobile device be known to the eNode-B
 eNB assigns a Cell Radio Network Temporary Identity
(C-RNTI)
 MAC layer ID
 e.g. scheduling grants in downlink control
channel (PDCCH) messages
Second: establish an RRC channel
 To exchange signaling messages with the eNode-
B and the core network
 By sending an RRC connection request message
to the network
Attach Procedure
 If access is granted
Third: the network responds with an RRC
connection setup message
 contain the assignment parameters for a dedicated
radio signaling bearer (SRB-1)
 from that moment onward used to transfer RRC
messages to the eNode-B
 SRB-1 is also used to transfer NAS signaling to and from
the MME
 These messages are encapsulated in RRC
messages
 contain MAC and physical layer parameters
 a DRX interval
 uplink shared channel configuration
 uplink power control…
Attach Procedure
Fourth: the mobile device returns an RRC
connection setup complete message to the
eNode-B
 the RRC part of the message
 the mobile device informs the eNode-B which MME it
was last connected to
 If no information about the previous MME is given
 the eNode-B selects one of its own
 An embedded NAS message
 the actual Attach Request message
 the eNode-B transparently forwards to the MME it has
selected
Attach Procedure
 Part of the message is the Globally Unique Temporary
Identity (GUTI)
 a temporary identifier
 the device was assigned when it was previously
connected to the network
 help the MME to locate the MME
 the device was previously connected
 to retrieve the user’s subscription profile
 to inform the old MME that the device has
changed its location
 In case the GUTI is not present or the MME is unable to
find the previous MME
 an authentication procedure is started
 involves the UE and the HSS
Attach Procedure
 Once the subscriber is authenticated
 ciphering and integrity checking for all control
messaging between the UE and the MME is
activated
 the eNode-B receives the necessary keys for
encryption of the user data later on and for
encryption and integrity checking of RRC
messages
 Fifth: Once the subscriber is authenticated
 the MME confirms the successful authentication to the
HSS
 sending a update location request message to the
HSS
 HSS responds with an update location
acknowledge
 the eNode-B asks the mobile device to provide a list of its
supported air interface functionalities with a UE capability
enquiry
Attach Procedure
 The mobile device responds to the message with a
UE capability information message
 contain information
 the supported radio technologies (GSM, UMTS,
CDMA, etc.)
 frequency band support of each technology…
 This information helps the eNode-B
 to select the best air interface parameters for the
device
 The interband and interradio technology
measurements
 it should configure so that the device can detect
other networks for a handover
 This information is also forwarded to the MME
Default bearer activation
 Once the MME has received the update
location acknowledge message from the
HSS
it starts the session establishment process in
the core network
 results in the creation of a tunnel over which the
user’s IP packets can be sent
 Be done by sending a create session request
message to the serving-GW of its choice
 The serving-GW in turn forwards the request to a
PDN-gateway
 located between the LTE core network and the Internet
Default bearer activation
 The PDN-GW then
 selects an IP address from a pool and
 responds to the serving-GW with a create session
response message
 The serving-GW then
 returns the message to the MME
 the tunnel for the IP packets of the user between the
serving-GW and the PDN-GW is ready to be used
 This tunnel is necessary as the user’s location and
hence its serving-GW can change during the lifetime
of the connection
Default bearer activation
 After the context for the user has been
established in the core network
the MME responds to the initial Attach
Request
 with an Initial Context Setup Request message
 includes the Attach Accept message
 On the S1 interface between the MME and eNode-B
 starts the establishment procedure for a user data
tunnel between the eNode-B and the serving-GW
 It includes the Tunnel Endpoint Identity (TEID)
 used on the serving-GW for this connection
Default bearer activation
The final link that has to be set up now
 the bearer for the user’s IP packets on the air
interface
 Be done by the eNode-B
 by sending an RRC Connection Reconfiguration
message to the mobile device
 Earlier during the attach process
 a signaling radio bearer (SRB-1) was established
for the signaling messages
 With this connection reconfiguration
 a second signaling radio bearer is established for
lower priority signaling messages
 a Data Radio Bearer (DRB) over which user’s IP
packets are transmitted is also established
Default bearer activation
 The message also includes two further NAS
messages
 Attach Accept message
 Activate Default Bearer Context Request message
 These messages configure the device’s higher protocol
layers on the radio protocol stack
 This step is also used to assign the IP address to the
mobile device for communication
 with the Internet
 other parameters
 such as the IP address of the DNS server
 The message includes the QoS profile for the default
bearer context
Default bearer activation
 Once the RRC part of the protocol stack
has been configured
the mobile device returns
 an RRC Connection Reconfiguration Complete
message
 to the eNode-B
 triggers the confirmation of the session establishment on
the S1 interface
 with an Initial Context Setup Response message
Default bearer activation
 After the mobile has also configured the
user plane part of the protocol stack
it returns an Attach Complete message to the
eNode-B
 includes the Activate Default Bearer Complete
message
Both messages are destined for the MME
 The final step of the attach procedure
to finalize the user data tunnel establishment
on the S1 interface
 between the serving-GW and the eNode-B


More Related Content

What's hot

Ericsson important optimization parameters
Ericsson important optimization parametersEricsson important optimization parameters
Ericsson important optimization parametersPagla Knight
 
Call flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowCall flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowEricsson Saudi
 
Lte kpi accessability
Lte kpi accessabilityLte kpi accessability
Lte kpi accessabilityDheeraj Yadav
 
Ericsson optimization opti
Ericsson optimization optiEricsson optimization opti
Ericsson optimization optiTerra Sacrifice
 
Interworking wcdma to lte
Interworking wcdma to lteInterworking wcdma to lte
Interworking wcdma to ltebahar
 
3 g huawei-wcdma-rno-parameters-optimization
3 g huawei-wcdma-rno-parameters-optimization3 g huawei-wcdma-rno-parameters-optimization
3 g huawei-wcdma-rno-parameters-optimizationshagahod
 
1.oeo000030 lte access fault diagnsis issue1
1.oeo000030 lte access fault diagnsis issue11.oeo000030 lte access fault diagnsis issue1
1.oeo000030 lte access fault diagnsis issue1Klajdi Husi
 
Chap 4. call processing and handover.eng
Chap 4. call processing and handover.engChap 4. call processing and handover.eng
Chap 4. call processing and handover.engsivakumar D
 
LTE RADIO PROTOCOLS
LTE RADIO PROTOCOLSLTE RADIO PROTOCOLS
LTE RADIO PROTOCOLSbrkavyashree
 
LTE Location Management and Mobility Management
LTE Location Management and Mobility ManagementLTE Location Management and Mobility Management
LTE Location Management and Mobility Managementaliirfan04
 
LTE Attach Call Flow_Vi.pptx
LTE Attach Call Flow_Vi.pptxLTE Attach Call Flow_Vi.pptx
LTE Attach Call Flow_Vi.pptxGaganVerma62
 
Top 10 3 G Radio Optimisation Actions
Top 10 3 G Radio Optimisation ActionsTop 10 3 G Radio Optimisation Actions
Top 10 3 G Radio Optimisation ActionsAbdul Muin
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guideMorg
 
Lte mac presentation
Lte mac presentationLte mac presentation
Lte mac presentationPraveen Kumar
 

What's hot (20)

Ericsson important optimization parameters
Ericsson important optimization parametersEricsson important optimization parameters
Ericsson important optimization parameters
 
Call flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowCall flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flow
 
Evo bsc-8200
Evo bsc-8200Evo bsc-8200
Evo bsc-8200
 
Lte kpi accessability
Lte kpi accessabilityLte kpi accessability
Lte kpi accessability
 
Ericsson optimization opti
Ericsson optimization optiEricsson optimization opti
Ericsson optimization opti
 
UMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFBUMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFB
 
Interworking wcdma to lte
Interworking wcdma to lteInterworking wcdma to lte
Interworking wcdma to lte
 
3 g huawei-wcdma-rno-parameters-optimization
3 g huawei-wcdma-rno-parameters-optimization3 g huawei-wcdma-rno-parameters-optimization
3 g huawei-wcdma-rno-parameters-optimization
 
1.oeo000030 lte access fault diagnsis issue1
1.oeo000030 lte access fault diagnsis issue11.oeo000030 lte access fault diagnsis issue1
1.oeo000030 lte access fault diagnsis issue1
 
Chap 4. call processing and handover.eng
Chap 4. call processing and handover.engChap 4. call processing and handover.eng
Chap 4. call processing and handover.eng
 
Huawei 3 g_capacity_optimization
Huawei 3 g_capacity_optimizationHuawei 3 g_capacity_optimization
Huawei 3 g_capacity_optimization
 
LTE RADIO PROTOCOLS
LTE RADIO PROTOCOLSLTE RADIO PROTOCOLS
LTE RADIO PROTOCOLS
 
LTE Location Management and Mobility Management
LTE Location Management and Mobility ManagementLTE Location Management and Mobility Management
LTE Location Management and Mobility Management
 
LTE Attach Call Flow_Vi.pptx
LTE Attach Call Flow_Vi.pptxLTE Attach Call Flow_Vi.pptx
LTE Attach Call Flow_Vi.pptx
 
Top 10 3 G Radio Optimisation Actions
Top 10 3 G Radio Optimisation ActionsTop 10 3 G Radio Optimisation Actions
Top 10 3 G Radio Optimisation Actions
 
Lte epc kp is and signalling (sf)
Lte epc kp is and signalling (sf)Lte epc kp is and signalling (sf)
Lte epc kp is and signalling (sf)
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guide
 
Lte mac presentation
Lte mac presentationLte mac presentation
Lte mac presentation
 
2 g data call flow
2 g data call flow2 g data call flow
2 g data call flow
 
Lte1841
Lte1841Lte1841
Lte1841
 

Viewers also liked

Lte rrc-connection-setup-messaging
Lte rrc-connection-setup-messagingLte rrc-connection-setup-messaging
Lte rrc-connection-setup-messagingPrashant Sengar
 
TRACK C: PDN (Power Delivery Network)/ Ronen Stilkol
TRACK C: PDN (Power Delivery Network)/ Ronen StilkolTRACK C: PDN (Power Delivery Network)/ Ronen Stilkol
TRACK C: PDN (Power Delivery Network)/ Ronen Stilkolchiportal
 
S1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setupS1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setupPrashant Sengar
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology EssentialsHussien Mahmoud
 
LTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang ShanLTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang ShanDarren Pauli
 
Quick attach summaryl
Quick attach summarylQuick attach summaryl
Quick attach summarylLarry Cragun
 
User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...Siddharth Rao
 
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)son6971
 
Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure3G4G
 
Lte attach-messaging
Lte attach-messagingLte attach-messaging
Lte attach-messagingPraveen Kumar
 
Lte protocol-stack-mac-rlc-pdcp
Lte protocol-stack-mac-rlc-pdcpLte protocol-stack-mac-rlc-pdcp
Lte protocol-stack-mac-rlc-pdcpPrashant Sengar
 
ANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package Convergence
ANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package ConvergenceANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package Convergence
ANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package ConvergenceAnsys
 
AIRCOM LTE Webinar 1 - Network Architecture
AIRCOM LTE Webinar 1 - Network ArchitectureAIRCOM LTE Webinar 1 - Network Architecture
AIRCOM LTE Webinar 1 - Network ArchitectureAIRCOM International
 

Viewers also liked (20)

PDN Overview
PDN OverviewPDN Overview
PDN Overview
 
Lte rrc-connection-setup-messaging
Lte rrc-connection-setup-messagingLte rrc-connection-setup-messaging
Lte rrc-connection-setup-messaging
 
3 gpp lte-rlc
3 gpp lte-rlc3 gpp lte-rlc
3 gpp lte-rlc
 
LTE Key Technologies
LTE Key TechnologiesLTE Key Technologies
LTE Key Technologies
 
TRACK C: PDN (Power Delivery Network)/ Ronen Stilkol
TRACK C: PDN (Power Delivery Network)/ Ronen StilkolTRACK C: PDN (Power Delivery Network)/ Ronen Stilkol
TRACK C: PDN (Power Delivery Network)/ Ronen Stilkol
 
S1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setupS1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setup
 
LTE Procedures
LTE ProceduresLTE Procedures
LTE Procedures
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology Essentials
 
LTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang ShanLTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang Shan
 
EPS presentation
EPS presentationEPS presentation
EPS presentation
 
Quick attach summaryl
Quick attach summarylQuick attach summaryl
Quick attach summaryl
 
User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...
 
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)
 
Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure
 
c1 & c2 values
c1 & c2 values c1 & c2 values
c1 & c2 values
 
Lte attach-messaging
Lte attach-messagingLte attach-messaging
Lte attach-messaging
 
Lte protocol-stack-mac-rlc-pdcp
Lte protocol-stack-mac-rlc-pdcpLte protocol-stack-mac-rlc-pdcp
Lte protocol-stack-mac-rlc-pdcp
 
ANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package Convergence
ANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package ConvergenceANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package Convergence
ANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package Convergence
 
AIRCOM LTE Webinar 1 - Network Architecture
AIRCOM LTE Webinar 1 - Network ArchitectureAIRCOM LTE Webinar 1 - Network Architecture
AIRCOM LTE Webinar 1 - Network Architecture
 
LTE Air Interface
LTE Air InterfaceLTE Air Interface
LTE Air Interface
 

Similar to 20121129 lte basic procedures (2)

cellular communications .pdf
cellular communications .pdfcellular communications .pdf
cellular communications .pdfMadhuriDesai15
 
Lecture 10_cellular.ppt
Lecture 10_cellular.pptLecture 10_cellular.ppt
Lecture 10_cellular.pptMashrukhZayed
 
Wireless Communications Presentati.ppt
Wireless Communications Presentati.pptWireless Communications Presentati.ppt
Wireless Communications Presentati.pptIhtisham Saeed
 
basic-celluar-systefhurdhguudhugudhguugudghum.ppt
basic-celluar-systefhurdhguudhugudhguugudghum.pptbasic-celluar-systefhurdhguudhugudhguugudghum.ppt
basic-celluar-systefhurdhguudhugudhguugudghum.pptmakeporium
 
DYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORK
DYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORKDYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORK
DYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORKcscpconf
 
Cellular communication
Cellular communicationCellular communication
Cellular communicationChyon Ju
 
Cellular communication
Cellular communicationCellular communication
Cellular communicationSwapnil Patil
 
Cellular communication
Cellular communicationCellular communication
Cellular communicationyemarmar
 
Module1 part2
Module1 part2Module1 part2
Module1 part2raksharao
 
Mobile communication - GSM/CDMA/WIMAX Technologies
Mobile communication - GSM/CDMA/WIMAX TechnologiesMobile communication - GSM/CDMA/WIMAX Technologies
Mobile communication - GSM/CDMA/WIMAX TechnologiesAman Abhishek
 
Basic of 3 g technologies (digi lab_project).pptx [repaired]
Basic of 3 g technologies (digi lab_project).pptx [repaired]Basic of 3 g technologies (digi lab_project).pptx [repaired]
Basic of 3 g technologies (digi lab_project).pptx [repaired]Shahrin Ahammad
 

Similar to 20121129 lte basic procedures (2) (20)

cellular communications .pdf
cellular communications .pdfcellular communications .pdf
cellular communications .pdf
 
Cellular communication
Cellular communicationCellular communication
Cellular communication
 
Lecture 10_cellular.ppt
Lecture 10_cellular.pptLecture 10_cellular.ppt
Lecture 10_cellular.ppt
 
Wireless Communications Presentati.ppt
Wireless Communications Presentati.pptWireless Communications Presentati.ppt
Wireless Communications Presentati.ppt
 
Basic celluar-system
Basic celluar-systemBasic celluar-system
Basic celluar-system
 
basic-celluar-systefhurdhguudhugudhguugudghum.ppt
basic-celluar-systefhurdhguudhugudhguugudghum.pptbasic-celluar-systefhurdhguudhugudhguugudghum.ppt
basic-celluar-systefhurdhguudhugudhguugudghum.ppt
 
DYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORK
DYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORKDYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORK
DYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORK
 
Gprs
GprsGprs
Gprs
 
Cellular communication
Cellular communicationCellular communication
Cellular communication
 
Cellular communication
Cellular communicationCellular communication
Cellular communication
 
Cellular communication
Cellular communicationCellular communication
Cellular communication
 
Cellular Communication
Cellular CommunicationCellular Communication
Cellular Communication
 
Gsm
GsmGsm
Gsm
 
Module1 part2
Module1 part2Module1 part2
Module1 part2
 
Mobile communication - GSM/CDMA/WIMAX Technologies
Mobile communication - GSM/CDMA/WIMAX TechnologiesMobile communication - GSM/CDMA/WIMAX Technologies
Mobile communication - GSM/CDMA/WIMAX Technologies
 
Cellular phone
Cellular phoneCellular phone
Cellular phone
 
GSM_SANAT_Ppt
GSM_SANAT_PptGSM_SANAT_Ppt
GSM_SANAT_Ppt
 
Ch5
Ch5Ch5
Ch5
 
Cellular Networks
Cellular NetworksCellular Networks
Cellular Networks
 
Basic of 3 g technologies (digi lab_project).pptx [repaired]
Basic of 3 g technologies (digi lab_project).pptx [repaired]Basic of 3 g technologies (digi lab_project).pptx [repaired]
Basic of 3 g technologies (digi lab_project).pptx [repaired]
 

Recently uploaded

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Recently uploaded (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

20121129 lte basic procedures (2)

  • 1. LTE Basic Procedures From cell search to context establishment
  • 2. Attach and default bearer activation message flow – part 1
  • 3. Cell Search  the mobile device performs a full search Voice-centric devices might start their search on GSM bands first as such networks are the most widely deployed and hence there is the highest probability to find a cell of a suitable network there. LTE devices that are more data centric might start the search by looking for LTE cells and fall back to UMTS and GSM cell search if not successful
  • 4. Cell Search  First step the mobile device searches on all channels in all supported frequency bands for an initial signal tries to pick up a primary synchronization signal (PSS)  PSS is broadcasted every 5 milliseconds  twice per air interface frame
  • 5. Cell Search  Second step the device remains on the channel locates the secondary synchronization signal (SSS)  which is also broadcast once every 5 milliseconds  While the content of the PSS is always the same, the content of the SSS is alternated in every frame  the mobile device can detect from the pattern as to where to find the beginning of the frame
  • 7. Cell Search  To make cell detection easier, the PSS and SSS are broadcast only on the inner 1.25MHz of the channel, irrespective of the total channel bandwidth. This way, a simpler FFT analysis can be performed to detect the signals. Also, the initial cell search is not dependent on the channel bandwidth. Hence, this speeds up the cell search process.
  • 8. Cell Search  The primary and secondary synchronization signals implicitly contain the PCI. The PCI is simply a lower layer physical identity of the cell The PCI is important to distinguish neighboring cells transmitting on the same frequency  especially in cell edge scenarios
  • 9. Cell Search  After detection of the PSS and SSS, the mobile device is also aware if the cell uses a normal or an extended cyclic prefix  The signals transmitted from the different cells on the same channel interfere with each other
  • 10. Cell Search  In case the mobile device has found the cell described on the SIM card after power up it may go directly to this cell stop searching for other cells on different channels in the current frequency band  even if the cell is not the strongest on the current channel. After a successful attach procedure  the cell reselection mechanism or a handover will ensure that the mobile device is served by the strongest cell it receives
  • 11. Cell Search  The next step in the cell search procedure Read the MIB from the PBCH  Broadcast every 40 milliseconds in the inner 1.25MHz of the channel  The MIB contains the most important information about the configuration of the channel  Very conservative modulation and strong error detection and correction information is added to allow successful decoding of this information even under very unfavorable reception conditions
  • 12. Cell Search  The first information that the mobile device gets from the MIB is the total bandwidth used for the channel since all decoding attempts so far were only performed in the inner 1.25MHz of the channel  Further, the MIB contains the structure of the HARQ indicator channel and the System Frame Number (SFN)  for ciphering and calculation of paging opportunities
  • 13. Cell Search  With the information from the MIB, the mobile device can then begin to search for the SIB-1. Broadcast on the downlink shared channel every 80 milliseconds the mobile device needs to decode the ‘common’ search space in the control region of a subframe to find a downlink control channel (PDCCH) message  announces the presence and location of the SIB-1 in the subframe.
  • 14. Cell Search  SIB-1 message contains the following information MCC and MNC of the cell  MCC: Mobile Country Code  MNC: Mobile Network Code  These parameters tell the mobile device if the cell belongs to the home network or not NAS cell identifier  similar to the cell-ID in GSM and UMTS Tracking Area Code (TAC)  corresponds to the location and routing areas in GSM and UMTS
  • 15. Cell Search Cell barring status  whether the cell can be used or not. Minimum reception level (q_RxLevMin)  If the level is lower  the mobile device must not try to establish communication with the cell A scheduling list of other SIBs  With the information provided in SIB-1 the mobile device can decide if it wants to start communicating with this cell
  • 16. Cell Search  SIB-2 contains further parameters that are required to communicate with a cell the configuration of the RACH the paging channel configuration the downlink shared channel configuration the PUCCH configuration; the SRS configuration in the uplink; uplink power control information; timers and constants (e.g. how long to wait for an answer to certain messages, etc.); uplink channel bandwidth.
  • 17. Attach and default bearer activation message flow – part 1
  • 18. Attach Procedure  Once the mobile device has all the required information to access the network MIB SIB-1 SIB-2…  Attach procedure Deliver an IP address  The mobile device is then able to send and receive data from the network
  • 19. Attach Procedure First: request resources on the uplink shared channel  A request on the RACH  To let the mobile device be known to the eNode-B  eNB assigns a Cell Radio Network Temporary Identity (C-RNTI)  MAC layer ID  e.g. scheduling grants in downlink control channel (PDCCH) messages Second: establish an RRC channel  To exchange signaling messages with the eNode- B and the core network  By sending an RRC connection request message to the network
  • 20. Attach Procedure  If access is granted Third: the network responds with an RRC connection setup message  contain the assignment parameters for a dedicated radio signaling bearer (SRB-1)  from that moment onward used to transfer RRC messages to the eNode-B  SRB-1 is also used to transfer NAS signaling to and from the MME  These messages are encapsulated in RRC messages  contain MAC and physical layer parameters  a DRX interval  uplink shared channel configuration  uplink power control…
  • 21. Attach Procedure Fourth: the mobile device returns an RRC connection setup complete message to the eNode-B  the RRC part of the message  the mobile device informs the eNode-B which MME it was last connected to  If no information about the previous MME is given  the eNode-B selects one of its own  An embedded NAS message  the actual Attach Request message  the eNode-B transparently forwards to the MME it has selected
  • 22. Attach Procedure  Part of the message is the Globally Unique Temporary Identity (GUTI)  a temporary identifier  the device was assigned when it was previously connected to the network  help the MME to locate the MME  the device was previously connected  to retrieve the user’s subscription profile  to inform the old MME that the device has changed its location  In case the GUTI is not present or the MME is unable to find the previous MME  an authentication procedure is started  involves the UE and the HSS
  • 23. Attach Procedure  Once the subscriber is authenticated  ciphering and integrity checking for all control messaging between the UE and the MME is activated  the eNode-B receives the necessary keys for encryption of the user data later on and for encryption and integrity checking of RRC messages  Fifth: Once the subscriber is authenticated  the MME confirms the successful authentication to the HSS  sending a update location request message to the HSS  HSS responds with an update location acknowledge  the eNode-B asks the mobile device to provide a list of its supported air interface functionalities with a UE capability enquiry
  • 24. Attach Procedure  The mobile device responds to the message with a UE capability information message  contain information  the supported radio technologies (GSM, UMTS, CDMA, etc.)  frequency band support of each technology…  This information helps the eNode-B  to select the best air interface parameters for the device  The interband and interradio technology measurements  it should configure so that the device can detect other networks for a handover  This information is also forwarded to the MME
  • 25. Default bearer activation  Once the MME has received the update location acknowledge message from the HSS it starts the session establishment process in the core network  results in the creation of a tunnel over which the user’s IP packets can be sent  Be done by sending a create session request message to the serving-GW of its choice  The serving-GW in turn forwards the request to a PDN-gateway  located between the LTE core network and the Internet
  • 26. Default bearer activation  The PDN-GW then  selects an IP address from a pool and  responds to the serving-GW with a create session response message  The serving-GW then  returns the message to the MME  the tunnel for the IP packets of the user between the serving-GW and the PDN-GW is ready to be used  This tunnel is necessary as the user’s location and hence its serving-GW can change during the lifetime of the connection
  • 27. Default bearer activation  After the context for the user has been established in the core network the MME responds to the initial Attach Request  with an Initial Context Setup Request message  includes the Attach Accept message  On the S1 interface between the MME and eNode-B  starts the establishment procedure for a user data tunnel between the eNode-B and the serving-GW  It includes the Tunnel Endpoint Identity (TEID)  used on the serving-GW for this connection
  • 28. Default bearer activation The final link that has to be set up now  the bearer for the user’s IP packets on the air interface  Be done by the eNode-B  by sending an RRC Connection Reconfiguration message to the mobile device  Earlier during the attach process  a signaling radio bearer (SRB-1) was established for the signaling messages  With this connection reconfiguration  a second signaling radio bearer is established for lower priority signaling messages  a Data Radio Bearer (DRB) over which user’s IP packets are transmitted is also established
  • 29. Default bearer activation  The message also includes two further NAS messages  Attach Accept message  Activate Default Bearer Context Request message  These messages configure the device’s higher protocol layers on the radio protocol stack  This step is also used to assign the IP address to the mobile device for communication  with the Internet  other parameters  such as the IP address of the DNS server  The message includes the QoS profile for the default bearer context
  • 30. Default bearer activation  Once the RRC part of the protocol stack has been configured the mobile device returns  an RRC Connection Reconfiguration Complete message  to the eNode-B  triggers the confirmation of the session establishment on the S1 interface  with an Initial Context Setup Response message
  • 31. Default bearer activation  After the mobile has also configured the user plane part of the protocol stack it returns an Attach Complete message to the eNode-B  includes the Activate Default Bearer Complete message Both messages are destined for the MME  The final step of the attach procedure to finalize the user data tunnel establishment on the S1 interface  between the serving-GW and the eNode-B 