Академический Документы
Профессиональный Документы
Культура Документы
Overview MTS
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Copyrights
The Motorola products described in this document may include copyrighted Motorola computer programs stored in semiconductor memories
or other media. Laws in the United States and other countries preserve for Motorola certain exclusive rights for copyright computer programs,
including the exclusive right to copy or reproduce in any form the copyright computer program. Accordingly, any copyright Motorola computer
programs contained in the Motorola products described in this document may not be copied or reproduced in any manner without the express
written permission of Motorola. Furthermore, the purchase of Motorola products shall not be deemed to grant either directly or by implication,
estoppel or otherwise, any license under the copyrights, patents or patent applications of Motorola, except for the rights that arise by operation
of law in the sale of a product.
Restrictions
The software described in this document is the property of Motorola. It is furnished under a license agreement and may be used and/or
disclosed only in accordance with the terms of the agreement. Software and documentation are copyright materials. Making unauthorized
copies is prohibited by law. No part of the software or documentation may be reproduced, transmitted, transcribed, stored in a retrieval system,
or translated into any language or computer language, in any form or by any means, without prior written permission of Motorola.
Accuracy
While reasonable efforts have been made to assure the accuracy of this document, Motorola assumes no liability resulting fromany inaccuracies
or omissions in this document, or from the use of the information obtained herein. Motorola reserves the right to make changes to any products
described herein to improve reliability, function, or design, and reserves the right to revise this document and to make changes from time to
time in content hereof with no obligation to notify any person of revisions or changes. Motorola does not assume any liability arising out of the
application or use of any product or circuit described herein; neither does it convey license under its patent rights of others.
Trademarks
Motorola and the Motorola logo are registered trademarks of Motorola Inc.
M-Cell, Tasknder and Intelligence Everywhere are trademarks of Motorola Inc.
All other brands and corporate names are trademarks of their respective owners.
CE Compliance
The CE mark conrms Motorola Ltds statement of compliance with
EU directives applicable to this product. Copies of the Declaration
of Compliance and installation information in accordance with the
requirements of EN50385 can be obtained from the local Motorola
representative or the CNRC help desk, contact details below:
Email: csc.emea@motorola.com
Tel: +44 (0) 1793 565 444
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
LTE
Contents
S
y
n
c
h
r
o
n
i
s
e
d
m
o
d
u
l
a
t
i
o
n
p
o
i
n
t
Modulation Point
Key Requirements
The number of radio cycles that occur in a modulation symbol
must be an integer number;
The number of radio cycles between subcarriers are integers;
There must be a constant amplitude and phase during a
modulation symbol.
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2-9
LTE
Version 1 Rev 2 OFDMA Operation
OFDMA Operation
Downlink Transmission Parameters
In the 3GPP specications a basic transmission scheme was identied using conventional OFDM using
a cyclic prex, with a subcarrier spacing f = 15 kHz and a Cyclic Prex (CP) duration Tcp = 4.7/16.7 s
(short/long CP).
More details are shown on the slide opposite.
3GPP TR 25.814 V7.1.0 (200609)
2-10 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
OFDMA Operation Version 1 Rev 2
OFDMA Operation
Downlink Transmission Parameters
7/6 Number of
OFDM symbols
per sub frame
(Short/Long CP)
1201 901 601 301 151 76 Number of occupied
sub-carriers
2048 1536 1024 512 256 128 FFT size
30.72 MHz
(8 3.84 MHz)
23.04 MHz
(6 3.84 MHz)
15.36 MHz
(4 3.84
MHz)
7.68 MHz
(2 3.84
MHz)
3.84 MHz 1.92 MHz
(1/2 3.84 MHz)
Sampling frequency
15 kHz Sub-carrier spacing
1 ms Sub-frame duration
20 MHz 15 MHz 10 MHz 5 MHz 2.5 MHz 1.25 MHz Transmission BW
7/6 Number of
OFDM symbols
per sub frame
(Short/Long CP)
1201 901 601 301 151 76 Number of occupied
sub-carriers
2048 1536 1024 512 256 128 FFT size
30.72 MHz
(8 3.84 MHz)
23.04 MHz
(6 3.84 MHz)
15.36 MHz
(4 3.84
MHz)
7.68 MHz
(2 3.84
MHz)
3.84 MHz 1.92 MHz
(1/2 3.84 MHz)
Sampling frequency
15 kHz Sub-carrier spacing
1 ms Sub-frame duration
20 MHz 15 MHz 10 MHz 5 MHz 3 MHz 1.4 MHz Transmission BW
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2-11
LTE
Version 1 Rev 2 OFDMA Operation
OFDMA Operation
OFDM Subcarrier Assignment
The number of subcarriers created for an OFDM channel depends upon the transmission bandwidth
chosen.
Data Subcarriers
The object of LTE is to carry data so the majority of the subchannels serve this purpose. A subset of
the data subcarriers is modulated by a serial data stream to pass one part of a parallel signal, before
all the subcarriers are combined into one multitone channel. The data rate of each data subcarrier is
determined by a combination of the symbol rate and the modulation scheme employed.
Reference Signals
The reference signals allow the receiver to make channel estimates, these are embedded on data
subcarriers periodically.
Null Subcarriers
The null subcarriers dont actually carry anything but are used for the guards and the DC subcarriers.
The guard subcarriers are found at either end of the range of the subcarriers and are used to prevent
interference between the OFDM channels. As they are null subcarriers there is a sudden drop in
power and this has been labeled the brick wall effect and has a good effect with regards to the level
of interference within the network.
The other null subcarrier is the DC subcarrier and this has 0Hz offset fromthe channels centre frequency.
2-12 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
OFDMA Operation Version 1 Rev 2
OFDMA Operation
OFDM Subcarrier Assignments
P
o
w
e
r
Frequency Domain
R
e
f
e
r
e
n
c
e
S
i
g
n
a
l
s
G
u
a
r
d
s
G
u
a
r
d
s
D
a
t
a
D
a
t
a
D
a
t
a
D
a
t
a
D
a
t
a
D
a
t
a
D
a
t
a
D
a
t
a
D
a
t
a
D
a
t
a
D
a
t
a
D
a
t
a
D
a
t
a
D
a
t
a
D
a
t
a
D
a
t
a
D
C
C
a
r
r
i
e
r
R
e
f
e
r
e
n
c
e
S
i
g
n
a
l
s
R
e
f
e
r
e
n
c
e
S
i
g
n
a
l
s
R
e
f
e
r
e
n
c
e
S
i
g
n
a
l
s
Serial-to-parallel
Converter
011101010111000
B
a
s
e
b
a
n
d
t
o
d
e
s
i
r
e
d
p
a
r
t
o
f
c
h
a
n
n
e
l
b
a
n
d
w
i
d
t
h
N
-
P
o
i
n
t
I
F
F
T
N
>
M
TX
CP
insertion
.
.
From
DFT
Set
to 0
Set
to 0
Channel
Decoding
User data
1001..
De-map
constellation
to data
Generate
constellation
P
e
r
f
o
r
m
M
-
P
o
i
n
t
I
D
F
T
(
f
r
e
q
t
o
t
i
m
e
)
S
u
b
-
C
a
r
r
i
e
r
D
e
-
M
a
p
p
i
n
g
N
-
P
o
i
n
t
F
F
T
N
>
M
RX
CP
Removal
.
.
From
FFT
Set
to 0
Set
to 0
Time Domain Time Domain Frequency Domain
Unique to SC-FDMA Used in OFDMA and SC-FDMA
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2-37
LTE
Version 1 Rev 2 Complete SC-FDMA Signal Generation
This page intentionally left blank.
2-38 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Multiple Antenna Systems Version 1 Rev 2
Chapter 3
Multiple Antenna Systems
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
3-1
LTE
Version 1 Rev 2 Multiple Antenna Systems
This page intentionally left blank.
3-2 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Objectives Version 1 Rev 2
Objectives
On completion of this chapter the student should be able to:
Describe the different types of antenna systems that may be used in an LTE network.
Describe the operation of SIMO.
Describe the operation of MISO.
Describe the operation of MIMO.
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
3-3
LTE
Version 1 Rev 2 Multiple Antenna Systems Overview
Multiple Antenna Systems Overview
Multiple antennas can be used for a number of reasons:
Improved transmission reliability;
Greater coverage or range;
Reduced power consumption and hence lower interference;
Increased transmission throughput.
Multiple Antenna Types
Systems maybe designed with the following types of multiple RX/TX antennas:
Single Input Multiple Output (SIMO);
Multiple Input Single Output (MISO);
Multiple Input Multiple Output (MIMO).
Multiple antenna systems are not unique to LTE and have been around for many years in 2G and 3G
systems alone. However cost has always been a major implication for may of the advanced antenna
techniques that we will be discussing in this chapter, but as the cost of technology decreases then
hopefully the use of these techniques will increase and the higher bit rates can be achieved.
3-4 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Multiple Antenna Systems Overview Version 1 Rev 2
Multiple Antenna Systems Overview
Multiple Antenna Techniques
Improved
transmission
reliability
Improved
transmission
reliability
Improved
transmission
reliability
Greater coverage or
range
Greater coverage or
range
Greater coverage or
range
Reduced power
consumption and hence
lower interference
Reduced power
consumption and hence
lower interference
Reduced power
consumption and hence
lower interference
Increased transmission
throughput
Increased transmission
throughput
Increased transmission
throughput
SIMO SIMO
MISO MISO
MIMO MIMO
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
3-5
LTE
Version 1 Rev 2 Single Input Multiple Output (SIMO)
Single Input Multiple Output (SIMO)
In a SIMO conguration the transmitter (usually the UE) has one transmitter and the receiver (usually the
base station) has two physically separated antennas. The distance between the antennas has a direct
relationship with the wavelength of the carrier, usually > . The receiver would then pick up multiple
versions of the same signal but separated spatially. The implementation of SIMO can vary and some of
the implementations are discussed below.
Switched Diversity
In this implementation the input with the best signal is chosen as the best source. The criteria for choosing
the best could be decided by Signal-to-Noise Ratio (SNR) or Bit Error Rate (BER) for example.
Switched diversity is more simple and inexpensive when compared to other types of SIMO.
Equal Gain Combining
This form of combining is a simple summation of all available signals.
Maximum Ratio Combining (MRC)
In this implementation each received channel has compensation applied to it before being combined to
produce a composite single signal. This technique is particularly effective where the signal undergoes
deep fades (due to multipath propagation for example). Because the signal is being received by two
antennas then the fades have a high probability to occur at different places therefore the reliability of the
radio link is increased.
3-6 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Single Input Multiple Output (SIMO) Version 1 Rev 2
Single Input Multiple Output (SIMO)
TX
Switched Diversity
Equal Gain Combining
Maximum Ratio Diversity
RX
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
3-7
LTE
Version 1 Rev 2 Multiple Input Single Output (MISO)
Multiple Input Single Output (MISO)
In the MISO implementation the transmitter has two or more physically separated antennas and
the receiver has one antenna. This is commonly referred to as transmit diversity and provides
radio communication using signals that originate from two or more independent sources that have
been modulated with identical information-bearing signals and that may vary in their transmission
characteristics at any given instant.
Space-Time block coding based Transmit Diversity (STTD)
In STTD the data to be transmitted is divided between two transmission antennas at the base station site
and transmitted simultaneously. The channel-coded data is processed in blocks of four bits. The bits are
time reversed and complex conjugated, as shown in the diagram opposite. The STTD method, in fact,
provides two brands of diversity. The physical separation of the antennas provides the space diversity,
and the time difference derived from the bit-reversing process provides the time diversity. These features
together make the decoding process in the receiver more reliable. In addition to data signals, pilot signals
are also transmitted via both antennas. The normal pilot is sent via the rst antenna and the diversity
pilot via the second antenna. The two pilot sequences are orthogonal, which enables the receiving UE
to extract the phase information for both antennas.
3-8 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Multiple Input Single Output (MISO) Version 1 Rev 2
Multiple Input Single Output (MISO)
TX
RX
b3 b2 b1 b0 b3 b2 b1 b0
Antenna 1
-b1 b0 b3 -b2 -b1 b0 b3 -b2
Antenna 2
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
3-9
LTE
Version 1 Rev 2 Multiple Input Multiple Output (MIMO)
Multiple Input Multiple Output (MIMO)
With MIMO there are both multiple antennas at both the transmitter and receiver. However there is a
bigger difference than this when comparing MIMO to both SIMO and MISO systems. Using SIMO and
MISO it is possible to:
Improved transmission reliability;
Increase coverage or range;
Reduce power consumption and hence lower interference.
By reducing the power the number of base stations can increase and therefore the system capacity
increases, but only logarithmically.
Symmetric MIMO congurations can increase the capacity linearly with the number of antennas used,
but at the cost of increased complexity.
MIMOs technique is to harness what was a largely negative aspect of radio propagation; multipath
propagation. By using these multipaths to transmit more information the system capacity rises by how
many antennas are equipped. The signals are transmitted in three dimensions time, frequency and
space. At the receiver the signals must be recovered, hence MIMO uses mathematical algorithms to
spread the data across multiple transmitting antennas.
MIMO Techniques
Space-Time Coding (STC)
STC- MIMO provides diversity gain to combat the effects of unwanted multipath propagation. Similar to
STTD time delayed and coded versions of the same signal are sent from the same transmitter antenna.
The codes that are used are mainly: trellis and block (less complex) codes.
This improves Signal Noise Ratio (SNR) for cell edge performance.
Spatial Multiplexing (SM)
With spatial multiplexing unique data streams are transmitted using the same time-frequency resource
over different antennas. However the unique data streams must be orthogonal to each other and this is
achieved by using a linear precoding matrix. It can double (2x2 MIMO) or quadruple (4x4 MIMO) capacity
and throughput. SM gives higher capacity when RF conditions are favorable and users are closer to the
BTS.
The slide opposite shows SM with a 2x2 conguration i.e. two transmit and two receive antennas.
Because of the multipath effects if you have two unknown transmitted signals and two measurements at
the receivers. If the two measurements are sufciently independent, you can differentiate between the
transmitted symbols.
If closed-loop MIMO is used then channel state information can be fed back to be used for such things
as precoding and adaptive modulation and coding.
A combination of both SM and STC - MIMO can be implemented and dynamic switching between the
two is possible dependant upon the RF conditions at the time.
3-10 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Multiple Input Multiple Output (MIMO) Version 1 Rev 2
Multiple Input Multiple Output (MIMO)
eNB
(TX)
UE
(RX)
Antenna 1
Antenna 2
Antenna 1
Antenna 2
h11
h12
h22
h21
Feedback
MIMO Channel Matrix
Space-Time Coding (STC) Improved cell edge coverage
Spatial Multiplexing (SM) Improved capacity
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
3-11
LTE
Version 1 Rev 2 Multi and Single User MIMO
Multi and Single User MIMO
MIMO is divided between Multi-User MIMO (MU-MIMO) and Single-User MIMO (SU-MIMO).
Multi-User MIMO Uplink Only
In this form of MIMO the data for different users is multiplexed onto a single time-frequency resource,
so the capacity of the cell can increase in terms of users without increasing the system bandwidth.
MU-MIMO uses a reference signal together with the actual data to allow the base station to identify
specic UEs.
Single-User MIMO Uplink and Downlink
This form of MIMO allows for either an improvement in performance or an increase in single user
throughput. It differentiates between the different antenna streams by adding a code layer.
Switching between MU-MIMO and SU-MIMO is allowed on a per UE basis.
The use of codes and reference signals not only allows the receiver to differentiate between antenna
streams and users, but also allows accurate channel estimation.
3-12 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Multi and Single User MIMO Version 1 Rev 2
Multi and Single User MIMO
SU-MIMO
Higher date rate
Reference Signal
SU-MIMO
Higher date rate
Reference Signal
MU-MIMO
Higher system capacity
Coding
MU-MIMO
Higher system capacity
Coding
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
3-13
LTE
Version 1 Rev 2 Closed Loop Precoding
Closed Loop Precoding
Because in an FDD system the downlink and uplink are several MHz apart then a system must exist for
the UE to indicate what parameters would allow it to perform optimally. This is achieved by the downlink
transmitting a pilot channel as a reference signal. The UE then evaluates various codebook options
that specify parameters, for example the phase shift between antennas. The UE will then transmit its
recommendations in the form of a codebook index to the eNB. The eNB can utilize the recommended
parameters using MIMO to transmit data to the UE.
3-14 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Closed Loop Precoding Version 1 Rev 2
Closed Loop Precoding
2. Evaluate codebook options
1. Pilot on multiple antennas 1. Pilot on multiple antennas
3. Preferred codebook index 3. Preferred codebook index
4. MIMO transmission 4. MIMO transmission
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
3-15
LTE
Version 1 Rev 2 Closed Loop Precoding
This page intentionally left blank.
3-16 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Channel Architecture and Resource Mapping Version 1 Rev 2
Chapter 4
Channel Architecture and Resource Mapping
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
4-1
LTE
Version 1 Rev 2 Channel Architecture and Resource Mapping
This page intentionally left blank.
4-2 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Objectives Version 1 Rev 2
Objectives
On completion of this chapter the student should be able to:
Describe the overall channel architecture.
Describe the logical channels.
Describe the transport channels.
Describe the physical channels.
Describe the downlink and uplink physical signals.
Describe the physical resource mapping.
Describe the downlink subframe.
Describe the uplink subframe.
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
4-3
LTE
Version 1 Rev 2 Channel Architecture
Channel Architecture
There are three different types of channel used in the E-UTRA channel architecture namely:
Logical channels.
Transport channels.
Physical channels.
The logical channels describe with what degree of reliability the information will be transmitted (i.e.
acknowledge mode or transparent mode etc), the transport channels describe how the information will
be formatted before being transmitted (i.e. coding, transport block size etc) and the physical channels
provide the transmission media through which the information is actually transmitted.
The architecture is designed to be exible so a logical channel maybe mapped to one of several
different transport channels depending on the format that is required for transmission. Also different
logical channels maybe added to the same transport channel where the different logical channels could
be multiplexed together to form a combined transport channel.
The physical layer is Layer 1 and has been explained in the chapters before. The MAC, RLC and PDCP
sublayers form Layer 2.
Service Access Points (SAP)s are identied for peer-to-peer communication between the sublayers.
The SAPs between the MAC sublayer and the RLC provide the logical channels. The multiplexing of
several logical channels (i.e. radio bearers) on the same transport channel (i.e. transport block) is
performed by the MAC sublayer.
4-4 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Channel Architecture Version 1 Rev 2
Channel Architecture
PHY
Physical Channels
Transport Channels
MAC
Scheduling/ Priority
MUX/DEMUX
HARQ
HARQ
Segmentation/ARQ etc
RLC
Logical Channels
Header compression/ ciphering etc
PDCP
RRC User Plane Applications
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
4-5
LTE
Version 1 Rev 2 Logical Channels
Logical Channels
The logical channels are Service Access Points (SAP)s between the MAC and RLC.
Data transfer services are provided by the MAC layer on logical channels. The different types of data
transfer offered by MAC are broken into two sets:
Control Channels (CCH).
Trafc Channels (TCH).
Each type of logical channel is dened by what type of information is transferred.
The slide shown opposite shows the structure of the logical channel architecture. The Signalling Radio
bearers (SRB) are used for RRC signalling and the Radio Bearers (RB) are used to carry any form of
data.
Signalling Radio Bearers (SRB)
SRBs are dened as RBs that are used only for the transmission of RRC and NAS messages. More
specically, the following three SRBs are dened:
SRB0 is for RRC messages using the CCCH logical channel.
SRB1 is for NAS messages and for most RRC messages, all using DCCH logical channel.
SRB2 is for high-priority RRC messages, using DCCH logical channel.
Control Channels
Broadcast Control Channel (BCCH) Downlink channel for broadcasting system information. The
BCCH can either be mapped onto the BCH or DL-SCH transport channels.
Paging Control Channel (PCH) The PCH is always mapped onto the PCH transport channel and is
used to carry paging information when the network does not know the location of the UE.
Common Control Channel (CCCH) This channel is used for transmitting RRC control information
relating to a UE before it moves into dedicated mode in other words no RRC connection exists for the
UE at this moment. It is mapped onto the transport UL/DL SCH.
Dedicated Control Channel (DCCH) A bi-directional control channel used to carry RRC signalling
information when the UE is in dedicated mode in other words a RRC connection exists. It is mapped
onto the transport UL/DL SCH.
Multicast Control Channel (MCCH) In the case of cells that support MBMS transmissions a MCCH
channel will be used for transmitting MBMS control information from the network to the UE. The MCCH
is mapped to the MCH transport channel in the case of a MBMS only cell or a cell that is utilizing a Single
Frequency Network (SFN) transmission. For cells that have both MBMS and other services, the MCCH
is mapped onto the DL-SCH transport channel.
Trafc Channels
Dedicated Trafc Channel (DTCH) This is a point-to-point channel dedicated to one UE for
transmission of user data. The user data maybe uplink/downlink or a combination of both. The DTCH
is always mapped onto a UL/DL-SCH transport channel.
Multicast Trafc Channel (MTCH) For cells that support MBMS transmissions a MTCH is used for
multimedia point-to-multipoint trafc. The MCCH is mapped to the MCH transport channel in the case of
a MBMS only cell or a cell that is utilizing a Single Frequency Network (SFN) transmission. For cells
that have both MBMS and other services, the MCCH is mapped onto the DL-SCH transport channel.
4-6 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Logical Channels Version 1 Rev 2
Logical Channels
DTCH DTCH
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
4-7
LTE
Version 1 Rev 2 Transport Channels
Transport Channels
Transport channels are SAPs between MAC and Layer 1 and offer signalling and data transport. The
MAC layer provides multiplexing/demultiplexing MAC Service Data Units (SDU)s into/from Transport
Blocks (TB)s to carry different amounts of data, together with coding and error correction through HARQ
etc.
The TBs, coding, modulation scheme used and how often they are sent across the air interface (referred
to as the Transmission Time Interval (TTI) form a Transport Format (TF).
Downlink Transport Channels
Broadcast Channel (BCH) This channel has a xed pre-dened transport format that is required to be
broadcast throughout the entire coverage of the cell. The BCH is mapped to the Physical BCH (PBCH).
Paging Channel (PCH) This channel has the ability to be mapped dynamically to physical layer
resources. The physical layer resource can be used for trafc or other control channels when not being
used by the PCH. UE Discontinuous Reception (DRX) is supported on this channel to enable UE power
saving. Once again the PCH is required to be broadcast throughout the entire coverage of the cell. The
PCH is mapped onto the same physical resource as the DL-SCH.
Downlink Shared Channel (DL-SCH) The DL-SCH is characterized by support for HARQ and
dynamic link adaptation. Dynamic link adaptation allows the modulation to vary as well as change in
coding use and variable power. The DL-SCH has the possibility to be used in the entire cell and has
the ability to support:
DRX.
MBMS.
Beamforming.
The DL-SCH supports both dynamic and semi-static resource allocation. The DL-SCH is mapped onto
the Physical Downlink Shared Channel (PDSCH).
Multicast Channel (MCH) This channel is used when the cell supports MBMS. There is requirement
for this channel to broadcast on the entire cell and support for semi-static resource allocation. The MCH
is mapped to the Physical MCH (PMCH).
Uplink Transport Channels
Random Access Channel (RACH) This an uplink channel used to carry limited control information
from the UE to the network. It is used for initial access to the cell or when a known UE needs to transmit
on the Physical Uplink Shared Channel (PUSCH) or Physical Uplink Common Channel (PUCCH)
and does not have a valid uplink grant. The RACH is mapped to the Physical RACH (PRACH).
Uplink Shared Channel (UL-SCH) This channel carries control and data and is characterized by
support for HARQ and dynamic link adaptation. It also has the ability to use beamforming and supports
both dynamic and semi-static resource allocation. The UL-SCH is mapped onto the PUSCH.
4-8 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Transport Channels Version 1 Rev 2
Transport Channels
DTCH DTCH
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
4-9
LTE
Version 1 Rev 2 Physical Channels
Physical Channels
The physical channel is dened as a set of Resource Elements (RE)s carrying information originating
from the higher layers.
As stated in the LTE Air Interface chapter the physical layer radio frame structure breaks the radio frame
into a time duration of 10 ms with each radio frame being broken down into 20 slots, with two slots forming
one subframe (assuming frame structure type 1).
Downlink Physical Channels
Physical Broadcast Channel (PBCH) The coded BCH transport block is mapped to four subframes
within a 40 ms interval. The 40 ms timing is blindly detected as there is no signalling indicate the 40 ms
timing. Each subframe is self-decodable and is used to receive system information such as AS, NAS
and registration area information.
Physical Hybrid ARQ Indicator Channel (PHICH) This channel carries Hybrid ARQ (HARQ)
ACK/NACK in relation to the uplink transmissions on the PUSCH. Each PHICH is addressed to a single
UE at a time, so there is a timing relationship between the uplink resource (sub-carriers) used for data
transmission and the downlink resource used by the PHICH.
Physical Control Format Indicator Channel (PCFICH) This channel is transmitted in every subframe
and its purpose is to inform the UE about the number of OFDM symbols used for the PDCCHs.
Physical Downlink Control Channel (PDCCH) This channel informs the UE about the resource
allocation for PCH and DL-SCH, plus the HARQ information relating to the DL-SCH. It also controls the
UL-SCH scheduling grants and indicates the UE identity. The PDCCH has four formats, hence the need
for the PCFICH. The PDCCH signalling is located in the rst 13 OFDM symbols in each 1 ms subframe.
Physical Downlink Shared Channel (PDSCH) This channel carries downlink data and/or higher
layer signalling. It is a shared channel hence it is allocated to different UEs on a per-TTI basis usually
every 1 ms. The channel coding, modulation and sub-carrier allocation is dynamic within each TTI, so
each downlink transmission must be addressed to a specic UE, this is done by the PDCCH.
Physical Multicast Channel (PMCH) This channel carries the MBMS data and control if the cell
supports MBMS functionality.
Uplink Physical Channels
Physical Random Access Channel (PRACH) This channel carries the random access preambles
when the UE wants to make initial contact with the network.
Physical Uplink Shared Channel (PUSCH) This channel carries uplink data and/or higher layer
signalling. It is a shared channel hence it is allocated to different UEs on a per-TTI basis usually every
1 ms.
Physical Uplink Control Channel (PUCCH) This channel carries uplink control information:
CQI.
Uplink scheduling requests.
ACK/NACK.
This information will be used when the UE has an uplink grant.
4-10 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Physical Channels Version 1 Rev 2
Physical Channels
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
4-11
LTE
Version 1 Rev 2 Physical Signals
Physical Signals
As we have seen in preceding discussions the resources are dened as block of resource elements.
These resource elements maybe dened as a set making up a physical channel or in this case a physical
signal. The difference between a physical channel and a physical signal is that the physical signal
originates from layer 1 on the transmitting side and the receivers higher layers will have no interest
in them.
Downlink Physical Channels
There are two types of downlink physical signal:
Reference Signal (RS).
Synchronization Signal (SS).
Reference Signal (RS)
The RS is used by the UE for channel estimation purposes. If the cell is using MIMO or transmit diversity
then a separate RS will be used for each antenna port, so it could be 1, 2 or 4. A different RS will be
transmitted from each antenna port so the UE can differentiate between them. When RS signals are
transmitted from one antenna port then the other antenna ports are idle.
The reference signals are transmitted on every sixth sub-carrier, the symbol that is used depends upon
whether normal or extended cyclic prex is used and what type of MIMO or transmit diversity is enabled.
The UE must know what sequences are transmitted on the RS for each antenna port so these are
broadcast on system information as well as the transmit power of the cell.
Synchronization Signal (SS)
There are two types of SS, primary SS and secondary SS.
Primary SS provides slot synchronization and secondary SS provides frame synchronization. This
combination of primary and secondary SS allows the cell to be detected. This procedure is covered in
more detail in later chapters.
Uplink Physical Channels
There are three types of uplink physical channel:
Demodulation RS.
Sounding RS.
Random Access Preamble.
Demodulation RS
This signal is used at the eNB to ensure that the uplink transmissions can be correctly decoded. It is
always sent by the UE as part of the PUSCH or PUCCH transmissions.
Sounding RS
This signal can be used though its use is not mandatory. One or a group of UEs can be ordered to
transmit on all or a subset of the available sub-carriers. Therefore the eNB will be able to estimate which
of those sub-carriers are best performing and the resources can be allocated accordingly.
It can also be used where the eNB does not have enough information to update the timing advance or
the transmit power commands for a given UE.
Random Access Preamble
This is used as part of the random access procedure which is discussed in more detail later. However the
random access burst consists of a long cyclic prex, the preamble itself and a guard period. The burst
is sent on 72 contiguous sub-carriers allocated for random access by the eNB. There are 64 possible
preamble sequences per cell.
4-12 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Physical Signals Version 1 Rev 2
Physical Signals
Downlink
Reference Signal (RS)
- MIMO
Synchronization Signal (SS)
- Primary SS
- Secondary SS
Uplink
Demodulation RS
Sounding RS
Random Access Preamble
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
4-13
LTE
Version 1 Rev 2 Resource Mapping
Resource Mapping
We have seen that the resources on the uplink and downlink are accessed by physical channels and
physical signals. In this section we are going to be looking at how these channel and signal resources
are mapped onto the frequency and time domain resources available on a particular cell.
Physical Resource Block (PRB)
When DL-SCH and UL-SCH channel resources are mapped onto the air interface they do so in PRBs. A
PRB consists of twelve consecutive sub-carriers in the frequency domain. In the time domain the number
of OFDM or SC-FDMA symbols in a slot depends whether a normal or extended cyclic prex is used. In
the case of a normal prex the number of symbols in a slot will be 7 in the time domain. The number of
PRB that can be assigned to a UE ranges between 6 and 100.
The time and frequency domains are represented on a resource grid as shown on the slide opposite (the
slide shows a normal cyclic prex and frame type 1). Each of the boxes in the grid represents a single
sub-carrier for one symbol period. For MIMO operation there will be a resource grid for each transmitting
antenna.
The downlink control channels are formed into Control Channel Elements (CCE)s. A CCE can be made
up of an aggregation of 1, 2, 4 or 8 mini-CCEs, where each mini-CCEs is made up of 4 REs.
4-14 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Resource Mapping Version 1 Rev 2
Resource Mapping
.
S
u
b
-
c
a
r
r
i
e
r
s
OFDM Symbols
0 1 2 3 4 5 18 20
Resource
Element
(RE)
Physical
Resource
Block (PRB)
Control Channel
Element (CCE)
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
4-15
LTE
Version 1 Rev 2 Downlink Subframe
Downlink Subframe
In the above slide opposite a resource grid for a downlink sub-frame is shown using a frame type 1 and
normal cyclic prex. In this case 2x2 MIMO is used to shown the effect of the RE cannot be used REs
and two PRBs shown.
Downlink Physical Control Channels
The control channels are found in the 1st to 3rd OFDM symbols with the occupation of the 1st OFDM
symbol being mandatory. This allows the UE to monitor the 1st OFDM symbol and detect whether their
is an assignment for it. If not in can enter sleep mode and save battery life, also it allows the UE to wake
up quickly and reduce latency.
PHICH
This channel is located in the 1st or 3rd OFDM symbol of the sub-frame and always occupies 3
mini-CCEs. The resources will be allocated semi-statically with the UE being informed were to look for
them. The PHICH function is to transmit the ACK/NACK for uplink transmissions.
PCFICH
The PCFICH is transmitted in the 1st OFDM symbol of the sub-frame and occupies 4 mini-CCEs. Its
function is to indicate to the UE the number of OFDM symbols (13) used for PDCCH signalling in each
sub-frame.
PDCCH
The PDCCH is mapped onto the remaining REs in the 1st to 3rd OFDM symbols in the rst slot of each
sub-frame. Different coding rates (data bits v error protection bits) can be achieved by the PDCCH by
aggregating different number of CCEs. By doing this the effective coding rate is reduced for UEs in good
RF conditions. It is based on the reported CQI and increases the probability that the PDCCH will be
correctly decoded. 1, 2, 4 or 8 CCEs can be aggregated to give approximate code rates of 2/3, 1/3, 1/6
and 1/12 for the PDCCH.
PBCH
The PBCH is found on the 72 sub-carriers centered around the DC sub-carrier in the 4th and 5th OFDM
symbol in slot 0 and the 1st and 2nd OFDM symbol in slot 1, over four consecutive radio frames. This is
shown on the second slide opposite.
Downlink Reference Signals
In the slide opposite two antenna ports are being used, the second OFDM mapping scheme for the
second antenna port is not shown.
Reference Signal (RS)
In the slide opposite the RS for the rst antenna port is labeled RS
0
. The CE marked with a X would be
used by the other antenna port so in this antenna port would not be used, therefore idle. Antenna RSs
are transmitted on equally spaced sub-carriers within the rst and fth OFDM symbol of each slot and
on every 6th sub-carrier. A known reference signal is transmitted in the RS CE and the UE determines
a channel impulse response for each antenna.
Synchronization Signal (SS)
The primary and secondary SS are transmitted in slot 0 and 10 on 64 sub-carriers centered around the
DC sub-carrier. The primary SS occupies the 7th OFDM symbol and the secondary SS the 6th. This is
shown on the second slide opposite.
4-16 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Downlink Subframe Version 1 Rev 2
Downlink Subframe
.
OFDM Subframe
14 15 16 17 18 19 0 1
.
RSo RSo
RSo RSo
RSo RSo
RSo RSo
PHICH - 1st or 3rd OFDM symbol
3 mini-CCEs
PCFICH - 1st OFDM symbol
4 mini-CCEs
PDCCH - remaining REs in the
1st to 3rd OFDM symbols
1, 2, 4 or 8 CCEs
RSo RSo
RS for antenna port 1
RE cannot be used
RSo RSo
RSo RSo
RSo RSo
RSo RSo
DL-SCH
DC
1
.
4
M
H
z
B
a
n
d
w
i
d
t
h
3
6
s
u
b
-
c
a
r
r
i
e
r
s
3
6
s
u
b
-
c
a
r
r
i
e
r
s
0
19 10
..
3
2
s
u
b
-
c
a
r
r
i
e
r
s
3
2
s
u
b
-
c
a
r
r
i
e
r
s
PBCH P-SS and S-SS
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
4-17
LTE
Version 1 Rev 2 Uplink Subframe
Uplink Subframe
In the uplink there are the following channels:
PUSCH.
PUCCH.
PRACH.
Plus the following physical signals:
Demodulation RS.
Sounding RS.
Uplink Physical Control Channels
Physical Uplink Control Channel (PUCCH)
The PUCCH carries uplink control information and is never transmitted simultaneously with the PUSCH.
There are multiple PUCCH formats supporting modulation schemes BPSK and QPSK with the number
of bits per sub-frame of 1, 2 and 20 depending on the format chosen. The PUCCH transmission is
frequency hopped at the slot boundary for added reliability.
Physical Random Access Channel (PRACH)
The random access procedure involves the physical and higher layers. At the physical layer, the cell
search procedure is initiated by transmission of the random access preamble by the UE. If successful, a
random access response is received from the base station.
Random access preambles are derived from Zadoff-Chu sequences. They are transmitted on blocks of
72 contiguous subcarriers allocated for random access by the base station. In FDD applications, there
are 64 possible preamble sequences per cell.
The exact frequencies used for transmission of the random access preamble is selected from available
random access channels by higher layers in the UE.
Uplink Physical Shared Channel
Physical Uplink Shared Channel (PUSCH)
Resources for the PUSCH are allocated on a sub-frame basis by the UL scheduler. Subcarriers are
allocated in multiples of 12 (PRBs) and maybe hopped from sub-frame to sub-frame. The PUSCH may
employ QPSK, 16QAM or 64QAM modulation.
Uplink Physical Signals
Demodulation RS
The demodulation RS is used by the eNB for coherent demodulation of uplink transmission. So in other
words, the demodulation RS is used for channel estimation.
Sounding RS
The sounding RS is used to facilitate frequency dependant scheduling by the eNB, by ordering the UE
to transmit a sounding RS using the full or subset of the available bandwidth.
4-18 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Uplink Subframe Version 1 Rev 2
Uplink Subframe
1
.
4
M
H
z
B
a
n
d
w
i
d
t
h
0
19 10
1 11
1
P
R
B
1
2
S
C
-
F
D
M
A
S
y
m
b
o
l
s
b
y
1
s
l
o
t
Sub-frame (1ms)
PUCCH RE
Demodulation RS
PUSCH RE
Sounding RS
1 PRB
1 Radio Frame
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
4-19
LTE
Version 1 Rev 2 Physical Random Access Channel (PRACH)
Physical Random Access Channel (PRACH)
The PRACH is accommodated over 72 consecutive subcarriers and can appear on any of the 10
subframes depending on conguration of the higher layers. The PRACH has a special subcarrier
spacing of 1.25 kHz so has a channel bandwidth of 90 kHz only. The RACH preamble is created in the
frequency domain and has a long Zadoff-Chu sequence applied to it in the time domain to allow multiple
UEs access to the same resource.
Preamble Formats
The conguration in the following table is applied for FDD. Higher layers control the preamble format.
Table 4-1
Burst Format T
cp
T
seq
0 3152T
s
24576T
s
1 21012T
s
24576T
s
2 6224T
s
2 24576T
s
3 21012T
s
2 24576T
s
T
s
= 10ms/307200
The burst format is decided by eNB:
Format 0 is used for normal cell.
Format 1 also known as extended format, is used for a large cell.
To support low data rate at the cell edge and considering power balancing, repetition is required for the
preamble. So Format 2 and 3 are called repeated format:
Format 2 is for maximum cell size of 30km Format 3 is used for maximum cell size of 100km.
Format 3 is used for maximum cell size of 100km.
4-20 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Physical Random Access Channel (PRACH) Version 1 Rev 2
Physical Random Access Channel (PRACH)
1
.
4
M
H
z
B
a
n
d
w
i
d
t
h
0 1 2 3 4 5 18 20
72 contiguous frequencies
1.25 kHz subcarrier spacing
PRACH
CP Zadoff-Chu Sequence GP
1ms Subframe
Tcp
Tseq
Size dependant on Burst Format (0,1,2 or 3)
0 - normal cell.
1 - extended format large cell
2 - repeated format 30km cell size
3 - repeated format 100km cell size
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
4-21
LTE
Version 1 Rev 2 Physical Random Access Channel (PRACH)
This page intentionally left blank.
4-22 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
LTE Network Elements Version 1 Rev 2
Chapter 5
LTE Network Elements
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
5-1
LTE
Version 1 Rev 2 LTE Network Elements
This page intentionally left blank.
5-2 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Objectives Version 1 Rev 2
Objectives
On completion of this chapter the student should be able to:
Describe the evolved architecture goals.
Describe the E-UTRAN and EPC architecture.
Describe the LTE R8 core network entities.
Describe the LTE interface reference points.
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
5-3
LTE
Version 1 Rev 2 Major Requirements for Evolved Architecture
Major Requirements for Evolved Architecture
There were a number of high level principles that were published by 3GPP to guide the architecture
evolution. The major requirements are discussed in this section.
3GPP R99 to R7 Feature Evolution
A number of features that were inherent in the existing 3GPP specications evolve into the LTE
architecture, these include:
Interworking with existing 3GPP systems (PS core, IP access and IMS).
3GPP and non 3GPP access systems supported.
Scalable system architecture solutions that dont compromise system expansion (separate control
and user planes).
The mobility management is able to accommodate terminals with different mobility requirements.
Network sharing and redundancy shall be supported.
Subscriber security procedures are at least as good as R7.
User identity security as good as R7 (idle mode signalling, attach/detach procedure.
Access to Evolved 3GPP with R99 Universal Subscriber Identity Module (USIM) permitted and
interworking with R5 HSS supported.
Existing charging principles apply.
Support for SMS and MMS over generic 3GPP IP access.
IP multicast supported and built into the system.
IPv4 and IPv6 supported within the system.
Enhanced Feature Evolution Goals
A number of enhancements were proposed for evolved architecture, these include:
Low Control Plane (C-plane) latency and QoS across all domains and access networks.
Reduction in tracking area updates.
Avoid tunnelling outside the current network areas by selecting or re-selecting MME, UPE, 3GPP
and SAE anchor.
Seamless operations between 3GPP, 3GPP2 and non-3GPP systems.
Non-3GPP system access can be allowed for LTE subscribers by business agreements between
Home Public Land Mobile Network HPLMN and Visitor Public Land Mobile Network (VPLMN).
Network operator can control which type of access system is being used by the subscriber.
Decrease in complexity by reducing the number of nodes and removing the CS CN.
Reduction in the signalling overhead on the air interface.
References:
3GPP TR 23.882 V1.14.0 (200801)
5-4 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Major Requirements for Evolved Architecture Version 1 Rev 2
Major Requirements for Evolved Architecture
LTE Architecture
Evolution
LTE Architecture
Evolution
Interworking with existing
3GPP, 3GPP2 systems +
access to non 3GPP
Scalable Scalable Scalable
Network sharing and
redundancy
Network sharing and
redundancy
Network sharing and
redundancy
Subscriber security,
USIM and user identity
Subscriber security,
USIM and user identity
Subscriber security,
USIM and user identity
Support for SMS, MMS
and MBMS
Support for SMS, MMS
and MBMS
Support for SMS, MMS
and MBMS
IPv4 and IPv6
supported
IPv4 and IPv6
supported
IPv4 and IPv6
supported
Low C-plane latency Low C-plane latency Low C-plane latency
Reduction in Tracking
Area Updates
Reduction in Tracking
Area Updates
Reduction in Tracking
Area Updates
Avoidance of tunnelling
out of network areas
Avoidance of tunnelling
out of network areas
Avoidance of tunnelling
out of network areas
Access to 3GPP systems
through non 3GPP systems
Access to 3GPP systems
through non 3GPP systems
Access to 3GPP systems
through non 3GPP systems
Reduction in the number of
Nodes
Reduction in the number of
Nodes
Reduction in the number of
Nodes
Reduction in the signalling
over the air interface
Reduction in the signalling
over the air interface
Reduction in the signalling
over the air interface
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
5-5
LTE
Version 1 Rev 2 E-UTRAN and EPC Architecture- Release 8
E-UTRAN and EPC Architecture- Release 8
The diagram opposite shows a simplied schematic of the R8 LTE overall architecture. The E-UTRAN
consists of Evolved NodeBs (eNB)s providing the Evolved Universal Terrestrial Radio Access
(E-UTRA) user plane and control plane protocol terminations towards the UE. The eNBs are connected
to each other by means of the X2 interface. The eNBs are also connected by means of the S1 interface
to the Evolved Packet Core (EPC), more specically to the Mobility Management Entity (MME) by
means of the S1MME and to the User Plane Entities (UPE), Serving Gateway (S-GW) and Packet
Data Network Gateway (P-GW) by means of the S1U. The S1 interface supports a many-to-many
relation between MMEs/S-GW and eNBs.
5-6 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
E-UTRAN and EPC Architecture- Release 8 Version 1 Rev 2
E-UTRAN and EPC Architecture- Release 8
MME S-GW
eNodeB
eNodeB
eNodeB
X2
X2
X2
S1
EPC
E-UTRAN
MME S-GW
P-GW
UPE
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
5-7
LTE
Version 1 Rev 2 User Equipment
User Equipment
There are ve different UE categories dened for LTE operation. Each LTE UE categories combines both
uplink and downlink characteristics. This is simple in comparison to HSPA where the UE categories are
dened separately for both the uplink and the downlink, resulting in many different combinations which
have to be included in the UE test specications.
The E-UTRA protocol stack will of course be present in the UE as it is in the eNB.
UE Categories
The table showing the downlink and uplink physical layer parameters are shown on the table opposite.
Transport Channel Parameters in Downlink
Maximum number of DL-SCH transport block bits received within a TTI: Denes the maximum
number of DL-SCH transport blocks bits that the UE is capable of receiving within a DL-SCH TTI. In case
of spatial multiplexing, this is the sum of the number of bits delivered in each of the two transport blocks.
This number does not include the bits of a DL-SCH transport block carrying BCCH in the same subframe.
Maximum number of bits of a DL-SCH transport block received within a TTI: Denes the maximum
number of DL-SCH transport block bits that the UE is capable of receiving in a single transport block
within a DL-SCH TTI.
Total number of DL-SCH soft channel bits: Denes the total number of soft channel bits available for
H-ARQ processing.
Transport Channel Parameters in Uplink
Maximum number of bits of an UL-SCH transport block transmitted within a TTI: Denes the
maximum number of bits of UL-SCH transport block transmitted within an UL-SCH TTI.
Physical Channel Parameters in Downlink
Maximum number of supported layers for spatial multiplexing in DL: Denes the maximum number
of supported layers for spatial multiplexing per UE.
Physical Channel Parameters in Uplink
Support for 64QAM in UL: Denes if 64QAM is supported in UL.
Total Layer 2 Buffer Size
This parameter denes the total layer 2 buffer size. The total layer 2 buffer size is dened as the sum
of the number of bytes that the UE is capable of storing in the RLC transmission windows and RLC
reception and reordering windows for all radio bearers.
5-8 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
User Equipment Version 1 Rev 2
User Equipment
[3434]
Yes
75376
4
3667200 151376 302752
5
[1832]
No
51024 2 1827072 75376 150752
4
[1373]
No
51024 2 1237248 75376 102048
3
[687]
No
25456 2 1237248 51024 51024
2
[138] No 5160
1
250368 10296 10296
1
Total layer
2 buffer
size
[kBytes]
Support
for
64QAM in
UL
Maximum
number of
bits of an UL-
SCH TB
transmitted
per TTI
Maximum
number of
supported
layers for
spatial
multiplexing
in DL
Total number
of soft
channel bits
Maximum
number of
bits of a DL-
SCH TB
received per
TTI
Maximum
number
of DL-
SCH TB
bits
received
per TTI
UE
Category
[3434]
Yes
75376
4
3667200 151376 302752
5
[1832]
No
51024 2 1827072 75376 150752
4
[1373]
No
51024 2 1237248 75376 102048
3
[687]
No
25456 2 1237248 51024 51024
2
[138] No 5160
1
250368 10296 10296
1
Total layer
2 buffer
size
[kBytes]
Support
for
64QAM in
UL
Maximum
number of
bits of an UL-
SCH TB
transmitted
per TTI
Maximum
number of
supported
layers for
spatial
multiplexing
in DL
Total number
of soft
channel bits
Maximum
number of
bits of a DL-
SCH TB
received per
TTI
Maximum
number
of DL-
SCH TB
bits
received
per TTI
UE
Category
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
5-9
LTE
Version 1 Rev 2 eNodeB
eNodeB
The major difference between the E-UTRAN and the existing 3G UTRAN is the removal of the RNC from
the architecture. The functionality previously handled by the RNC is moved to the eNB.
The eNB is responsible for the following functions:
Radio Resource Management (RRM).
Radio Bearer (RB) control.
Call Admission Control (CAC).
Connection mobility control.
Scheduling uplink and downlink.
IP header compression and encryption of user data streams.
Selection of MME at UE attachment when there is no routing information available for an MME.
Routing of User Plane (UP) data towards the S-GW.
Scheduling and transmission of paging messages from MME.
Scheduling and transmission of broadcast information from MME or Operations and Management
(O&M).
Measurement and measurement reporting for mobility and scheduling.
The radio protocol stack remains the same for LTE as was the case for R99 onwards 3G namely:
Physical layer
Medium Access Control (MAC).
Radio Link Control (RLC).
Packet Data Convergence Protocol (PDCP).
3GPP TS 36.300 V8.5.0 (200805) E-UTRA and E-UTRAN; Overall description
5-10 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
eNodeB Version 1 Rev 2
eNodeB
eNB
Inter Cell RRM
RB Control
Connection Mobility Cont
Call Admission Control
eNB Measurements and
Measurement Reporting
Scheduler
PHY
MAC
RLC
PDCP
RRC
MME
S-GW P-GW
R
a
d
i
o
P
r
o
t
o
c
o
l
s
EPC E-UTRAN
S1
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
5-11
LTE
Version 1 Rev 2 Mobility Management Entity (MME)
Mobility Management Entity (MME)
The MME is the key control-node for the LTE access network. It is responsible for idle mode UE tracking
and paging procedure including retransmissions. It is involved in the bearer activation/deactivation
process and is also responsible for choosing the S-GW for a User Equipment (UE) at the initial attach
and at time of intra-LTE handover involving CN node relocation. It is responsible for authenticating the
user (by interacting with the HSS). The Non-Access Stratum (NAS) signaling terminates at the MME
and it is also responsible for generation and allocation of temporary identities to UEs. It checks the
authorization of the UE to camp on the service providers PLMN and enforces UE roaming restrictions.
The MME is the termination point in the network for ciphering/integrity protection for NAS signaling
and handles the security key management. Lawful interception of signaling is also supported by the
MME. The MME also provides the control plane function for mobility between LTE and 2G/3G access
networks with the S3 interface terminating at the MME from the SGSN. The MME also terminates the
S6a interface towards the home HSS for roaming UEs.
The MME hosts the following functions:
NAS signalling.
NAS signalling security.
Access Stratum (AS) security.
Lawful interception.
Inter CN node signalling for mobility between 3GPP/3GPP2 access networks.
Idle mode UE reachability (including control and execution of paging transmission).
Tracking area list management (for UE in idle and active mode).
P-GW and S-GW selection.
MME selection for handovers with MME change.
SGSN selection for handovers to 2G or 3G 3GPP/3GPP2 access networks.
Roaming.
Authentication.
Bearer management functions including dedicated bearer establishment.
MBMS Control functionality.
3GPP TS 36.300 V8.5.0 (200805) E-UTRA and E-UTRAN; Overall description
3GPP TS 23.401 V8.2.0 (2008-06) GPRS enhancements for E-UTRA Network
5-12 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Mobility Management Entity (MME) Version 1 Rev 2
Mobility Management Entity (MME)
MME
NAS signalling and security NAS signalling and security
AS Security AS Security
Inter CN node signalling Inter CN node signalling
Idle mode UE reachability (paging etc) Idle mode UE reachability (paging etc)
Tracking area management Tracking area management
P-GW and S-GW selection P-GW and S-GW selection
eNB
S-GW
P-GW
EPC E-UTRAN
S1
MME selection for handovers
on MME change
MME selection for handovers
on MME change
SGSN selection for handovers
to 2G or 3G 3GPP/3GPP2 AN
SGSN selection for handovers
to 2G or 3G 3GPP/3GPP2 AN
Roaming and authentication Roaming and authentication
Bearer management functions
including dedicated bearer
establishment
Bearer management functions
including dedicated bearer
establishment
Lawful interception Lawful interception
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
5-13
LTE
Version 1 Rev 2 Serving Gateway (S-GW)
Serving Gateway (S-GW)
The S-GW routes and forwards user data packets, while also acting as the mobility anchor for the
user plane during inter-eNB handovers and as the anchor for mobility between LTE and other 3GPP
technologies (terminating S4 interface and relaying the trafc between 2G/3G systems and P-GW). For
idle state UEs, the S-GW terminates the Downlink (DL) data path and triggers paging when DL data
arrives for the UE. It manages and stores UE contexts, e.g. parameters of the IP bearer service, network
internal routing information. It also performs replication of the user trafc in case of lawful interception.
The S-GW hosts the following functions:
The local mobility anchor point for inter-eNB handovers.
Mobility anchoring for inter-3GPP mobility.
E-UTRAN idle mode downlink packet buffering and initiation of network triggered service request
procedures.
Lawful interception.
Packet routing and forwarding.
Transport level packet marking in the uplink and downlink.
Accounting on user and QoS Class Identier (QCI) for inter-operator charging.
Uplink (UL) and DL charging per UE, PDN and QCI.
3GPP TS 36.300 V8.5.0 (200805) E-UTRA and E-UTRAN; Overall description
3GPP TS 23.401 V8.2.0 (2008-06) GPRS enhancements for E-UTRA Network
5-14 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Serving Gateway (S-GW) Version 1 Rev 2
Serving Gateway (S-GW)
S-GW
Local mobility anchor for
inter eNB handover
Mobility anchor for inter-3GPP
mobility
E-UTRAN idle mode packet buffering
Lawful interception Lawful interception
Packet routing and forwarding Packet routing and forwarding
Inter operator charging Inter operator charging
eNB
MME
P-GW
EPC E-UTRAN
S1
UL and DL charging per UE,
PDN and QCI
UL and DL charging per UE,
PDN and QCI
Transport level marking in the
UL and DL
Transport level marking in the
UL and DL
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
5-15
LTE
Version 1 Rev 2 Packet Data Network Gateway (P-GW)
Packet Data Network Gateway (P-GW)
The P-GW provides connectivity to the UE to external packet data networks by being the point of exit
and entry of trafc for the UE. A UE may have simultaneous connectivity with more than one P-GW
for accessing multiple PDNs. The P-GW performs policy enforcement, packet ltering for each user,
charging support, lawful Interception and packet screening. Another key role of the P-GW is to act as
the anchor for mobility between 3GPP and non-3GPP technologies such as WiMAX and 3GPP2 (Code
Division Multiple Access 1X (CDMA) 1X and Evolution Data Only (EvDO)).
The P-GW hosts the following functions:
Per-user based packet ltering.
Law interception.
UE IP address allocation.
Transport level packet marking in the downlink.
UL and DL service level charging, gating and rate enforcement.
DL rate enforcement based on Aggregate Maximum Bit Rate (AMBR).
3GPP TS 36.300 V8.5.0 (200805) E-UTRA and E-UTRAN; Overall description
3GPP TS 23.401 V8.2.0 (2008-06) GPRS enhancements for E-UTRA Network
5-16 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Packet Data Network Gateway (P-GW) Version 1 Rev 2
Packet Data Network Gateway (P-GW)
P-GW
Per user based packet
filtering
Lawful interception
UE IP address allocation
Transport level packet marking in DL
UL and DL service level
charging, gating and rate
enforcement
DL rate enforcement based on
AMBR
eNB
MME
S-GW
EPC E-UTRAN
S1
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
5-17
LTE
Version 1 Rev 2 R8 LTE Core Network Entities
R8 LTE Core Network Entities
The other entities found with the R8 LTE CN are described in this section.
Home Subscriber Server (HSS)
The HSS, is a master user database that supports the IMS network entities that actually handle calls. It
contains the subscription-related information (user proles), performs authentication and authorization
of the user, and can provide information about the users physical location. It is similar to the GSM Home
Location Register (HLR) and Authentication Centre (AUC).
A Subscriber Location Function (SLF) is needed to map user addresses when multiple HSSs are used.
Both the HSS and the SLF communicate through the Diameter protocol.
Equipment Identity Register (EIR)
The EIR keeps a list of mobile phones (identied by their IMEI) which are to be banned from the network
or monitored. This is designed to allow tracking of stolen mobile phones. The EIR is a database
that contains information about the identity of the mobile equipment that prevents calls from stolen,
unauthorised or defective mobile stations.
Policy and Charging Rules Function (PCRF)
The PCRF encompasses policy control decision and ow based charging control functionalities.
This is a logical node that creates rules for setting both policy and charging. These rules could be set
using a combination of parameters (example, User Mike is only allowed voice and video and network X
can have a max bandwidth of 256kbps so when User Joe connects from network X, both attributes are
combined and apply to arrive at User Joe is only allowed voice and video at 256kbps while connected
to X). In other words it sets the QoS policy.
The PCRF interacts with the Policy and Charging Enforcement Function (PCEF) that acts on the rules
from PCRF and enforces the same. The protocol between PCRF and PCEF happens to be Diameter
(mapped to Gx interface). The PCEF is logically found in the P-GW.
Evolved Packet Data Gateway (ePDG)
The ePDG is used to allocate a remote IP address for the local IP address to the ePDG which is used for
Care of Address (CoA) when the S2c is used and the same to the P-GW when the S2b is used. It used
to transport the packets from the P-GW to the UE including de-capsulation/en-capsulation of packets
for IP Security (IP-SEC) and Proxy Mobile IP (PMIP) tunnels. Also the aforementioned tunnels are
authenticated and authorized by the ePDG. It also enforces QoS policies based on information received
via the AAA infrastructure and has lawful interception responsibilities.
If network based mobility is used (S2b) is acts as a Mobile Access Gateway (MAG) and acts a local
anchor within an untrusted non 3GPP access network.
3GPP Authentication Authorization Accounting (AAA) Server
A network server used for access control. Authentication identies the user. Authorization implements
policies that determine which resources and services a valid user may access. Accounting keeps track
of time and data resources used for billing and analysis.
Non 3GPP IP Access
A non-3GPP IP access is dened as either trusted or non-trusted:
Trusted Means that the network operator has chosen to trust the non-3GPP IP access network
based on business agreements etc. There will likely be specic security agreements in place and
IP Security (IPsec) tunnel between the UE and the 3GPP EPC will not be required.
Non-Trusted This is an IP access network that requires the use of IPsec tunnel between the UE
and the 3GPP EPC to provide an adequate security mechanism acceptable to the 3GPP network
operator i.e WLAN.
5-18 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
R8 LTE Core Network Entities Version 1 Rev 2
R8 LTE Core Network Entities
eNB eNB
S-GW S-GW MME MME
HSS HSS P-GW P-GW
Operators IP
services
PCRF
ePDG
Untrusted Non
3GPP IP Access
Untrusted Non
3GPP IP Access
Trusted Non
3GPP IP Access
Trusted Non
3GPP IP Access
SGSN
3GPP AAA
Server
GERAN
UTRAN
S1u S1-MME
S6a
S5/S8
S3
S2b
SGi
SWn S2a
S2c
S2c
S11
S7
Rx
S6b
SWm
SWa
SWx
LTE-Uu
S4
S12
S10
eNB eNB
X2
EIR
S13
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
5-19
LTE
Version 1 Rev 2 LTE Reference Points
LTE Reference Points
The slide opposite shows the major LTE reference points.
The reference points between the EPC and the E-UTRAN include:
LTE-Uu Reference point for the air interface between the UE and the eNB.
S1MME Reference point for the control plane protocol between E-UTRAN and MME.
S1U Reference point between E-UTRAN and S-GW for the per bearer user plane tunnelling
and inter eNodeB path switching during handover.
X2 Reference point between eNBs, this is used for mobility management functions.
S5 It provides user plane tunneling and tunnel management between S-GW and P-GW. It is
used for S-GW relocation due to UE mobility and if the S-GW needs to connect to a non-collocated
P-GW for the required PDN connectivity.
S8 Inter-PLMNreference point providing user and control plane between the S-GWin the VPLMN
and the P-GW in the HPLMN. S8 is the inter PLMN variant of S5.
The reference points between LTE and inter-3GPP access onto 3G UTRAN and 2G GPRS and
EDGE RAN (GERAN) networks are:
S3 It enables user and bearer information exchange for inter 3GPP access network mobility in
idle and/or active state. It is based on Gn reference point as dened between SGSN.
S4 It provides related control and mobility support between GPRS Core and the 3GPP Anchor
function of S-GW and is based on Gn reference point as dened between SGSN and GGSN. In
addition, if direct tunnel is not established, it provides the user plane tunnelling.
S12 Reference point between UTRAN and S-GW for user plane tunneling when a direct tunnel
is established. It is based on the Iu-u/Gn-u reference point using the GPRS Tunneling Protocol
User (GTP-U) protocol as dened between SGSN and UTRAN or respectively between SGSN
and GGSN. Usage of S12 is an operator conguration option.
The reference points between LTE and non-3GPP access include:
S2a It provides the user plane with related control and mobility support between trusted non
3GPP IP access and the gateway.
S2b It provides the user plane with related control and mobility support between ePDG and the
gateway.
S2c It provides the user plane with related control and mobility support between UE and the
gateway. This reference point is implemented over trusted and/or untrusted non-3GPP Access
and/or 3GPP access.
SWn This is the reference point between the untrusted Non-3GPP IP access and the ePDG.
Trafc on this interface for a UE-initiated tunnel has to be forced towards ePDG.
The reference points between the 3GPP AAA server and other entities include:
S6b It is the reference point between P-GW and 3GPP AAA server/proxy for mobility related
authentication if needed. This reference point may also be used to retrieve and request storage of
mobility parameters. This reference point may also be used to retrieve static QoS prole for a UE
for non-3GPP access in case dynamic Policy and Charging Control (PCC) is not supported.
SWa It connects the untrusted non-3GPP IP access with the 3GPP AAA server/proxy and
transports access authentication, authorization and charging-related information in a secure
manner.
SWm This reference point is located between 3GPP AAA Server/Proxy and ePDG and is used
for AAA signaling (transport of mobility parameters, tunnel authentication and authorization data).
SWx This reference point is located between 3GPP AAA Server and HSS and is used for
transport of authentication data.
The reference points between the MME and other network elements include:
S10 Reference point between MMEs for MME relocation and MME to MME information transfer.
S11 Reference point between MME and S-GW.
S6a This interface is dened between MME and HSS for authentication and authorization. It can
be used with DIAMETER protocol only and if MAP was used it would have to be via Inter Working
Function (IWF).
S13 This interface enables UE identity check procedure between MME and EIR.
5-20 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
LTE Reference Points Version 1 Rev 2
LTE Reference Points
eNB eNB
S-GW S-GW MME MME
HSS HSS P-GW P-GW
Operators IP
services
PCRF
ePDG
Untrusted Non
3GPP IP Access
Untrusted Non
3GPP IP Access
Trusted Non
3GPP IP Access
Trusted Non
3GPP IP Access
SGSN
3GPP AAA
Server
GERAN
UTRAN
S1u S1-MME
S6a
S5/S8
S3
S2b
SGi
SWn S2a
S2c
S2c
S11
S7
Rx
S6b
SWm
SWa
SWx
LTE-Uu
S4
S12
S10
eNB eNB
X2
EIR
S13
The reference points between the LTE CN and the IP services include:
SGi It is the reference point between the P-GW and the Packet Data Network (PDN). may be an
operator external public or private packet data network or an intra operator PDN, e.g. for provision
of IMS services. This reference point corresponds to Gi for 3GPP accesses.
S7 It provides transfer of QoS policy and charging rules from PCRF to Policy and Charging
Enforcement Point (PCEF) ) in the P-GW.
Rx The Rx reference point resides between the Application Function (AF) and the PCRF. This
reference point enables transport of application level session information from AF to PCRF. Such
information includes, but is not limited to:
IP lter information to identify the service data ow for policy control and/or differentiated
charging.
Media/application bandwidth requirements for QoS control.
3GPP TS 23.401 V8.2.0 (2008-06) GPRS enhancements for E-UTRAN access
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
5-21
LTE
Version 1 Rev 2 Security in LTE
Security in LTE
The security functions include:
Guards against unauthorised EPS service usage (authentication of the UE by the network and
service request validation).
Provision of user identity condentiality (temporary identication and ciphering).
Provision of user data and signalling condentiality (ciphering).
Provision of origin authentication of signalling data (integrity protection).
Authentication of the network by the UE.
EPS Key Hierarchy
A security key hierarchy is used within LTE which is used to derive keys to be used for NAS, UP and
RRC trafc for both encryption and integrity protection.
K Key
The K key is permanently stored on the USIMs Universal Integrated Circuit Card (UICC) and in the
AuC. (usually part of HSS).
The CK and IK Keys
These pair of keys are derived from a AKA run (see in Appendix xx for AKA procedures).
K
ASME
During the authentication procedure the UE receives the authentication request message which contains
the KSI
ASME
. The KSI
ASME
is a number which is associated with the K
ASME
allowing the UE to identify the
K
ASME
. It also allows the UE to re-use the K
ASME
during subsequent connection set-ups. If the K
ASME
is
stored in the UE it will be deleted when the UE is powered down or the USIM removed.
K
eNB
This is a key derived by the UE and MME from the K
ASME
. It may also be derived from the KeNB* during
eNB handover.
Keys for NAS Trafc
K
NASint
This a key which is used for protection of NAS trafc with a particular integrity algorithm. This
key is derived by the UE and MME from K
ASME
.
K
NASenc
This a key which is used for encryption of NAS trafc with a particular encryption algorithm.
This key is derived by the UE and MME from K
ASME
.
Keys for UP Trafc
K
upenc
This key is only used for protection of UP trafc with a particular encryption algorithm. This key
is derived by the UE and eNB from the K
eNB
.
Keys for RRC Trafc
K
RRCint
This a key which is used for protection of RRC trafc with a particular integrity algorithm. This
key is derived by the UE and eNB from the K
eNB
.
K
RRCenc
This a key which is used for protection of RRC trafc with a particular encryption algorithm.
This key is derived by the UE and eNB from the K
eNB
.
The details of the security procedure can be found in Appendix A at the end of this course.
3GPP TS 36.300 V8.5.0 (200805) E-UTRA and E-UTRAN; Overall description
5-22 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Security in LTE Version 1 Rev 2
Security in LTE
K
USIM/AuC
CK, IK
UE/HSS
KASME
UE/ASME
KNAS enc KNAS int
UE/MME
KeNB
KeNB-UP-enc KeNB-RRC-int KeNB-RRC-enc
UE/eNB
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
5-23
LTE
Version 1 Rev 2 Security in LTE
This page intentionally left blank.
5-24 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Self-conguring and Self-optimizing Networks (SON) Version 1 Rev 2
Chapter 6
Self-conguring and Self-optimizing Networks (SON)
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
6-1
LTE
Version 1 Rev 2 Self-conguring and Self-optimizing Networks (SON)
This page intentionally left blank.
6-2 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Objectives Version 1 Rev 2
Objectives
On completion of this chapter the student should be able to with relation to SON:
Describe coverage and capacity optimization.
Describe energy savings.
Describe interference reduction.
Describe automated conguration of physical cell id.
Describe mobility robustness.
Describe load balancing optimisation.
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
6-3
LTE
Version 1 Rev 2 Coverage and Capacity Optimisation
Coverage and Capacity Optimisation
A typical operational task is to optimise the network according to coverage and capacity. Planning tools
support this task based on theoretical models but for both problems measurements must be derived in
the network. Call drop rates give a rst indication for areas with insufcient coverage, trafc counters
identify capacity problems.
Objectives:
Optimisation of network coverage.
Maximise the system capacity.
Expected results:
Continuous coverage.
Increased capacity of the system.
Interference reduction.
Controlled cell edge performance.
Savings on drive tests.
Minimised human intervention in network management and optimisation tasks.
Self-healing in case of equipment (e.g. eNB) failure by automatic reconguration of surrounding
eNBs.
Solution Description
At the time of writing the specications only state that input data in the form of measurements and
performance data will inuence the network entities and parameters to achieve the desired results.
6-4 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Coverage and Capacity Optimisation Version 1 Rev 2
Coverage and Capacity Optimisation
Continuous coverage
Increased capacity of the system
Interference reduction
Controlled cell edge performance
Savings on drive tests
Minimised human intervention in
network management and
optimisation tasks
Self-healing in case of equipment
(e.g. eNB) failure by automatic
reconfiguration
of surrounding eNBs.
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
6-5
LTE
Version 1 Rev 2 Energy Savings and Interference Reduction
Energy Savings and Interference Reduction
This sections briey looks at the benets of switching off the eNB to save on energy and to reduce
interference.
Energy Savings
A typical critical cost for the operator is the energy expenses. Cuts on energy expenses could be realized
if the capacity offered by the network would match the needed trafc demand at any point of time as close
as possible.
Objective:
Energy savings based on e.g. cell switch on/off.
Expected results:
Cuts on operational expenses through energy savings.
Solution Description
At the time of writing the specications only state that input data in the form of measurements and
performance data will inuence the network entities and parameters to achieve the desired results.
Interference Reduction
Capacity could be improved through interference reduction by switching off those cells which are not
needed for trafc at some point of time, in particular home eNodeBs when the user is not at home.
Objective:
Interference reduction based on cell switch on/off.
Expected results:
Increased capacity through interference reduction.
Increased quality through interference reduction.
Solution Description
At the time of writing the specications only state that input data in the form of measurements and
performance data will inuence the network entities and parameters to achieve the desired results.
6-6 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Energy Savings and Interference Reduction Version 1 Rev 2
Energy Savings and Interference Reduction
Switch off eNB to save on power
and interference particularly on
indoor home cells.
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
6-7
LTE
Version 1 Rev 2 Automated Conguration of Physical Cell Identity
Automated Conguration of Physical Cell Identity
The proposed SON use case provides an automated conguration of a newly introduced cells physical
ID (L1 cell identier
Objective:
Automatic conguration of the Physical ID of an eNBs radio cell.
The physical cell identity, or L1 identity, is an essential conguration parameter of a radio cell, it
corresponds to a unique combination of one orthogonal sequence and one pseudo-random sequence,
and 504 unique Phy_IDs are supported leading to unavoidable reuse of the Phy_ID in different cells.
When a new eNB is brought into the eld, a Phy_ID needs to be selected for each of its supported cells,
avoiding collision with respective neighbouring cells (the use of identical Phy_ID by two cells results in
interference conditions hindering the identication and use of any of them where otherwise both would
have coverage). Traditionally, the proper Phy_ID is derived from radio network planning and is part of
the initial conguration of the node. The Phy_ID assignment shall full following conditions:
It shall be collision-free: the Phy_ID is unique in the area that the cell covers.
It shall be confusion-free: a cell shall not have neighbouring cells with identical Phy_ID.
Solution Description
Self-conguration case applied during initial cell conguration.
At the time of writing the specications only state that input data in the form of measurements and
performance data will inuence the network entities and parameters to achieve the desired results.
6-8 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Automated Conguration of Physical Cell Identity Version 1 Rev 2
Automated Conguration of Physical Cell Identity
Phy_cell_id = 1
Phy_cell_id = 2
Phy_cell_id = 3
Phy_cell_id = 4
Phy_cell_id = x
Cell A
Cell B
Cell D
Cell C
New Cell
Unique Physical Cell ID
for any new cell
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
6-9
LTE
Version 1 Rev 2 Mobility Robustness Optimisation
Mobility Robustness Optimisation
Manual setting of HO parameters in current 2G/3G systems is a time consuming task. In many cases, it
is considered too costly to update the mobility parameters after the initial deployment.
For some cases, RRM in one eNB can detect problems and adjust the mobility parameters, but there
are also examples where RRM in one eNB cannot resolve problems:
Identifying and avoid using non-suitable neighbours.
The eNB for the source cell cannot always detect when a handover was performed to a non-suitable
cell. One example of this is radio link failures occurring shortly after the UE has connected to the
target cell.
Identifying problematic settings of cell selection/reselection parameters.
Minimise handovers immediately after initial RRC connection establishment.
If the idle and active mode mobility parameters are not well aligned, this may result in a large number
of handover shortly after the UE has transited from idle to active mode. For the scenarios where
this behaviour is not intended, or where the number of handover exceeds an acceptable level it
would be benecial to be able to detect and control this behaviour.
Solution Description
At the time of writing the specications only state that input data in the form of measurements and
performance data will inuence the network entities and parameters to achieve the desired results.
6-10 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Mobility Robustness Optimisation Version 1 Rev 2
Mobility Robustness Optimisation
Phy_cell_id = 1
Phy_cell_id = 2
Phy_cell_id = 3
Phy_cell_id = 4
Cell A
Cell B
Cell D
Cell C
Cell E
Phy_cell_id = 5
Neighbour cell configuration
Handover failure detection
Cell selections/reselection parameter problem resolution
Handover parameter problem resolution
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
6-11
LTE
Version 1 Rev 2 Mobility Load Balancing Optimisation
Mobility Load Balancing Optimisation
Optimisation of cell reselection/handover parameters to cope with the unequal trafc load and minimize
the number of handovers and redirections needed to achieve the load balancing.
Self-optimisation of the intra-LTE and inter-RAT mobility parameters to the current load in the cell
and in the adjacent cells can improve the system capacity compared to static/non-optimised cell
reselection/handover parameters and can minimise human intervention in the network management
and optimisation tasks.
The load balancing shall not affect the user QoS negatively in addition to what a user would experience
at normal mobility without load-balancing. Service capabilities of RATs must be taken into account, and
solutions should take into account network deployments with overlay of high-capacity and low-capacity
layers where high-capacity layer can have spotty coverage.
Solution Description
General features of the solution are as follows:
Functionality: an algorithm decides to distribute the UEs camping and/or delay or advance handing
of the UEs over between cells and thus to balance the trafc load between cells.
Actions:
An eNB monitors the load in the controlled cell and exchanges related information over X2 with
node(s) residing the algorithm for load balancing.
An algorithm identies the need to distribute the load of the cell towards adjacent cells, e.g. by
comparing the load among the cells, the type of ongoing services, the cell conguration, etc.
The handover margins and/or cell reselection parameters between the cell controlled by the
eNB and one or more neighbouring cells are modied in a coordinated manner in both cells to
avoid any problems with for example ping-pong.
Expected results:
According to the cell reselection and handover mechanisms, part of the UEs at the cell border
reselect or hand over to the less congested cell.
In the new situation the cell load is balanced.
Increased capacity of the system.
Minimised human intervention in network management and optimisation tasks.
6-12 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Mobility Load Balancing Optimisation Version 1 Rev 2
Mobility Load Balancing Optimisation
X2
X2
X2
Lightly loaded
eNB
Normal Loaded eNB Heavily loaded eNB
Move traffic by cell
reselection or
handovers to lightly
loaded eNB
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
6-13
LTE
Version 1 Rev 2 Mobility Load Balancing Optimisation
This page intentionally left blank.
6-14 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
Appendix A Version 1 Rev 2
Chapter 7
Appendix A
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
7-1
LTE
Version 1 Rev 2 Appendix A
This page intentionally left blank.
7-2 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
The Security Architecture Detail Version 1 Rev 2
The Security Architecture Detail
The Security Architecture
Five security feature groups are dened. Each of these feature groups meets certain threats,
accomplishes certain security objectives:
Network access security (I): the set of security features that provide users with secure access to 3G
services, and which in particular protect against attacks on the (radio) access link.
Network domain security (II): the set of security features that enable nodes in the provider domain to
securely exchange signalling data, and protect against attacks on the wireline network.
User domain security (III): the set of security features that secure access to mobile stations.
Application domain security (IV): the set of security features that enable applications in the user and in
the provider domain to securely exchange messages.
Visibility and congurability of security (V): the set of features that enables the user to inform himself
whether a security feature is in operation or not and whether the use and provision of services should
depend on the security feature.
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
7-3
LTE
Version 1 Rev 2 The Security Architecture Detail
The Security Architecture Detail
Application
Stratum
Transport
Stratum
Home
Stratum/
Serving
Stratum
AN
(IV)
(I)
(III) (V)
(I) (I)
(I)
(II)
(I)
MT
TE USIM
User Application Provider Application
SN
HE
7-4 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
The Security Architecture Detail Version 1 Rev 2
The Security Architecture Detail
Security and Privacy
User authentication:
The property that the Serving Network (SN) corroborates the identity of the user;
Network authentication:
The property that the user corroborates that he is connected to a serving network that is authorised by
the users HE to provide him services; this includes the guarantee that this authorisation is recent.
Condentiality
Cipher algorithm agreement: the property that the UE and the SN can securely negotiate the algorithm
that they shall use subsequently;
Cipher key agreement: the property that the UE and the SN agree on a cipher key that they may use
subsequently;
Condentiality of user data: the property that user data cannot be overheard on the radio access
interface;
Condentiality of signalling data: the property that signalling data cannot be overheard on the radio
access interface.
Data integrity
Integrity algorithm agreement: the property that the UE and the SN can securely negotiate the integrity
algorithm that they shall use subsequently;
Integrity key agreement: the property that the UE and the SN agree on an integrity key that they may
use subsequently;
Data integrity and origin authentication of signalling data: the property that the receiving entity (UE
or SN) is able to verify that signalling data has not been modied in an unauthorised way since it was
sent by the sending entity (SN or UE) and that the data origin of the signalling data received is indeed
the one claimed.
Mobile equipment identication
In certain cases, SN may request the UE to send it the mobile equipment identity of the terminal. The
mobile equipment identity shall only be sent after authentication of SN with exception of emergency
calls. The IMEI should be securely stored in the terminal. However, the presentation of this identity to
the network is not a security feature and the transmission of the IMEI is not protected. Although it is not
a security feature, it should not be deleted from LTE however, as it is useful for other purposes.
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
7-5
LTE
Version 1 Rev 2 The Security Architecture Detail
The Security Architecture Detail
User Authentication
Network Authentication
Confidentiality
Data integrity
Mobile equipment identification
7-6 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
The Security Architecture Detail Version 1 Rev 2
The Security Architecture Detail
Authentication and Key Agreement
Authentication and Key Agreement (AKA) achieves mutual authentication by the user and the
network showing knowledge of a secret key K which is shared between and available only to the
USIM and the AuC in the users HE. In addition the USIM and the HE keep track of counters SEQ
MS
and SEQ
HE
respectively to support network authentication. The method was chosen in such a way
as to achieve maximum compatibility with the current GSM/UMTS security architecture and facilitate
migration from GSM to UMTS to LTE. The method is composed of a challenge/response protocol
identical to the GSM/UMTS subscriber authentication and key establishment protocol combined with a
sequence number-based one-pass protocol for network authentication derived from the ISO standard
ISO/IEC 9798-4
Distribution of authentication data from HE to SN
Upon receipt of a request from the MME, the HE/AuC sends an ordered array of n authentication vectors
(the equivalent of a GSM "triplet") to the MME. Each authentication vector consists of the following
components: a random number RAND, an expected response XRES, a cipher key CK, an integrity key
IK and an authentication token AUTN. Each authentication vector is good for one authentication and key
agreement between the MME and the USIM.
Authentication and Key Agreement
When the MME initiates an authentication and key agreement, it selects the next authentication vector
from the array and sends the parameters RAND and AUTN to the user. The USIM checks whether AUTN
can be accepted and, if so, produces a response RES which is sent back to the MME. The USIM also
computes CK and IK.
The MME compares the received RES with XRES. If they match the MME considers the authentication
and key agreement exchange to be successfully completed. The established keys CK and IK will then
be transferred by the USIM and the MME to the entities which perform ciphering and integrity functions.
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
7-7
LTE
Version 1 Rev 2 The Security Architecture Detail
The Security Architecture Detail
UE MME HE/HSS
Authentication request
Authentication data response
AV (1 . . . n)
Store authentication vectors
Select authentication vectors
User authentication request
RAND(i) || AUTN(i)
Verify AUTN(i)
compute
User authentication
RES(i)
Compare RES(i) and XRES(i)
Compute CK(i) and IK(i) Select CK(i) and IK(i)
Distribution
authentication vectors
from HE to SN
Authentication Key
Generate
vectors AV (1 . . . n)
7-8 Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
2008 Motorola, Inc.
LTE
The Security Architecture Detail Version 1 Rev 2
The Security Architecture Detail
Ciphering Algorithms
The ciphering algorithms used in LTE are shown on the slide opposite. As can be seen a lot of different
algorithms are active in the LTE system. Algorithms f1 to f5 are of the type that are used to compute
numbers for use in authentication procedures.
Two very important algorithms, f8 and f9 are also shown, they have the following functions.
F8
This algorithm will perform the ciphering function. The ciphering function is performed either in the RLC
sub-layer or in the MAC sub-layer according to the following rules:
If a radio bearer is using a non-transparent RLC mode (AM or UM), ciphering is performed in the
RLC sub-layer.
If a radio bearer is using the transparent RLC mode, ciphering is performed in the MAC sub-layer.
Ciphering when applied is performed in the eNB and the UE and the context needed for ciphering (CK,
Count-C, etc.) is only known in eNB and the UE.
F9
Most of the control signalling information elements that are sent between the UE and the network are
considered sensitive and must be integrity protected. Therefore a message authentication function
has been developed to solve this problem. The UE will still go through the initial RRC connection
establishment sequence and perform the set-up security functions. After this however some signalling
messages will be encoded using the f9 algorithm. This will be the case for all RRC, MM, CC, GMM and
SM Messages. The MM procedure in the UE will be the process responsible for starting the integrity
protection procedure.
AK Anonymity Key
AKA Authentication and key agreement
AUTN Authentication Token
MAC The message authentication code included in AUTN, computed using f1
XRES Expected Response
2008 Motorola, Inc.
Long Term Evolution (LTE) Technical Overview MTS
FOR TRAINING PURPOSES ONLY - THIS MANUAL WILL NOT BE UPDATED
7-9
LTE
Version 1 Rev 2 The Security Architecture Detail
The Security Architecture Detail
F1 - Message authentication function used to compute MAC
K-Long-term secret key shared between the USIM and the AuC