Академический Документы
Профессиональный Документы
Культура Документы
What is LTE?
LTEi (Long Term Evolution) is initiated by 3GPPi to improve the mobile phone standard to cope
with future technology evolutions and needs.
What is EUTRAN?
The E-UTRAN (Evolved UTRAN) consists of eNBs, providing the E-UTRA user plane
(PDCP/RLC/MAC/PHY) and control plane (RRC) protocol terminations towards the UE. The
eNBs are interconnected with each other by means of the X2 interface. The eNBs are also
connected by means of the S1 interface to the EPC (Evolved Packet Core), more specifically to
the MME (Mobility Management Entity) by means of the S1-MME and to the Serving Gateway
(S-GW) by means of the S1-U.
S1-MME :- Reference point for the control plane protocol between E-UTRAN and
MME.
S1-U:- Reference point between E-UTRAN and Serving GW for the per bearer user
plane tunnelling and inter eNodeB path switching during handover.
S3:- It enables user and bearer information exchange for inter 3GPP access network
mobility in idle and/or active state.
S4:- It provides related control and mobility support between GPRS Core and the 3GPP
Anchor function of Serving GW. In addition, if Direct Tunnel is not established, it
provides the user plane tunnelling.
S5:- It provides user plane tunnelling and tunnel management between Serving GW and
PDN GW. It is used for Serving GW relocation due to UE mobility and if the Serving
GW needs to connect to a non-collocated PDN GW for the required PDN connectivity.
S6a:- It enables transfer of subscription and authentication data for
authenticating/authorizing user access to the evolved system (AAA interface) between
MME and HSS.
Gx:- It provides transfer of (QoS) policy and charging rules from PCRF to Policy and
Charging Enforcement Function (PCEF) in the PDN GW.
S8:- Inter-PLMN reference point providing user and control plane between the Serving
GW in the VPLMN and the PDN GW in the HPLMN. S8 is the inter PLMN variant of
S5.
S9:- It provides transfer of (QoS) policy and charging control information between the
Home PCRF and the Visited PCRF in order to support local breakout function.
S10:- Reference point between MMEs for MME relocation and MME to MME
information transfer.
S11:- Reference point between MME and Serving GW.
S12:- Reference point between UTRAN and Serving GW for user plane tunnelling when
Direct Tunnel is established. It is based on the Iu-u/Gn-u reference point using the GTPU protocol as defined between SGSN and UTRAN or respectively between SGSN and
GGSN. Usage of S12 is an operator configuration option.
S13:- It enables UE identity check procedure between MME and EIR.
SGi:- It is the reference point between the PDN GW and the packet data network. Packet
data network may be an operator external public or private packet data network or an
intra operator packet data network, e.g. for provision of IMS services. This reference
point corresponds to Gi for 3GPP accesses.
Rx:- The Rx reference point resides between the AF and the PCRF in the TS 23.203.
SBc:- Reference point between CBC and MME for warning message delivery and control
functions.
Login or register to post comments
What is VoLGA?
VoLGA stands for "Voice over LTE via Generic Access". The VoLGA service resembles the
3GPP Generic Access Network (GAN). GAN provides a controller node - the GAN controller
(GANC) - inserted between the IP access network (i.e., the EPS) and the 3GPP core network.
The GAN provides an overlay access between the terminal and the CS core without requiring
specific enhancements or support in the network it traverses. This provides a terminal with a
'virtual' connection to the core network already deployed by an operator. The terminal and
network thus reuse most of the existing mechanisms, deployment and operational aspects.
see VoLGA - Voice over LTE via Generic Access for more details.
The keys used for NAS and AS protection shall be dependent on the algorithm with
which they are used.
The eNB keys are cryptographically separated from the EPC keys used for NAS
protection (making it impossible to use the eNB key to figure out an EPC key).
The AS (RRC and UP) and NAS keys are derived in the EPC/UE from key material that
was generated by a NAS (EPC/UE) level AKA procedure (KASME) and identified with
a key identifier (KSIASME).
The eNB key (KeNB) is sent from the EPC to the eNB when the UE is entering ECMCONNECTED state (i.e. during RRC connection or S1 context setup).
charging will help operators monetize their LTE investment by providing customers with a
variety of QoS and charging options when choosing a service.
The LTE PCC functions include:
PCRF (policy and charging rules function) provides policy control and flow based
charging control decisions.
PCEF (policy and charging enforcement function) implemented in the serving gateway,
this enforces gating and QoS for individual IP flows on the behalf of
the PCRF. It also provides usage measurement to support charging
OCS (online charging system) provides credit management and grants credit to the PCEF
based on time, traffic volume or chargeable events.
OFCS (off-line charging system) receives events from the PCEF and generates charging
data records (CDRs) for the billing system.
Along with LTE introduction, 3GPP also standardized Single Radio Voice Call Continuity
(SRVCC) in Release 8 specifications to provide seamless continuity when an UE handovers
from LTE coverage (E-UTRAN) to UMTS/GSM coverage (UTRAN/GERAN). With SRVCC,
calls are anchored in IMS network while UE is capable of transmitting/receiving on only one of
those access networks at a given time.
See Evolution of Single Radio Voice Call Continuity (SRVCC) for more details.
For details read LCS Architecture for LTE EPS and LTE UE positioning in E-UTRAN
SECTION B
1. Which type of cell provides the best level of service for average subscribers?
A. Acceptable cell
B. Barred Cell
C. Reserved Cell
D. Suitable Cell
2. Why is a Cyclic Prefix required in OFDMA?
A. The Metropolitan museum of art
B. Boston Smithsonian
C. NASA
D. Washington Smithsonian institution museum of fine art
3. Which UE categories support 64QAM on the uplink?
A. Only category 5
B. Categories 3, 4 and 5
C. None of them
D. All of them
4. What types of handover are supported in LTE?
A. Hard handover only
B. Hard and soft handovers
C. Hard, soft and softer handovers
D. Handover is not supported
5. What does the DC subcarrier indicate?
A. The identity of the cell
B. The antenna configuration
C. The center of the OFDM channel
D. The format of the data channel
6. What processing step combines multiple OFDM subcarriers into a single signal for
transmission?
A. FFT
B. IFFT
C. RF Combining
D. Channel Mapping
7. What is the minimum amount of RF spectrum needed for an FDD LTE radio channel?
A. 1.4 MHz
B. 2.8 MHz
C. 5 MHz
D. 20 MHz
8. In MIMO, which factor has the greatest influence on data rates?
A. The size of the antenna
B. The height of the antenna
C. The number of transmit antennas
D. The number of receive antennas
9. What organization is responsible for developing LTE standards?
A. UMTS
B.
C.
D.
3GPP
3GPP2
ISO
10. Which channel indicates the number of symbols used by the PDCCH?
A. PHICH
B. PDCCH
C. PBCH
D. PCFICH
11. How often can resources be allocated to a UE?
A. Every symbol
B. Every slot
C. Every subframe
D. Every frame
12. What property of OFDMA systems allows adjacent subcarriers to be used without
interference?
A. Orthogonality
B. Orthodoxy
C. Octagonality
D. Originality
13. With the normal Cyclic Prefix, how many symbols are contained in 1 frame?
A. 7
B. 12
C. 20
D. 140
14. What is the largest channel bandwidth a UE is required to support in LTE?
A. 20 MHz
B. 10 MHz
C. 5 MHz
D. 1.4 MHz
15. In OFDM, what is the relationship between the subcarrier spacing f and the symbol time t?
A. There is no fixed relation
B. f = t
C. f x t = 2048
D. f = 1/t
16. What is the PBCH scrambled with?
A. The physical cell ID
B. The current frame number
C. The UE's C-RNTI
D. The PBCH is not scrambled
17. Why is the Cyclic Prefix a copy of the tail end of the symbol?
A. It ensures a continuous time domain signal
B. It maintains an integer number of cycles
C. It reduces the Peak-to-Average Power Ratio (PAPR)
D. It increases the useful symbol time
SECTION C
LTE and LTE advanced technology is fast evolving in cellular arena and demand in the
industries have been increased for LTE skilled engineers. These top 12 LTE interview questions
and answers help engineers seeking LTE technology job to crack the interview with ease. One
can refer page links mentioned on left side panel to learn more about LTE.
Question-1: What is the difference between LTE FDD and LTE TDD?
Answer-1:The difference lies in the LTE frame structure in both the FDD and TDD versions of
the LTE. In FDD there will be pair of frequencies assigned in the downlink and uplink directions
and hence transmissions from multiple subscribes can happen at the same time but on different
frequencies as mentioned. In TDD, one single frequency will be used at different time instants by
multiple subscriber terminals (UEs). Both frame versions of LTE will have 1 ms sub-frame
duration and 0.5 ms slot duration. Read more.
Question-2: What is resource block in LTE?
Answer-2:LTE frame is divided based on time slots on time axis and frequency subcarrier on
frequency axis. Resource block is the smallest unit of resource allocation in LTE system. It is of
about 0.5ms duration and composed of 12 subcarriers in 1 OFDM symbol. One time slot is equal
to 7 OFDM symbols in normal cyclic prefix and 6 OFDM symbols in extended cyclic prefix.
One full resource block is equal to 12 subcarriers by 7 symbols in normal CP. Hence it consists
of total 84 time/frequency elements referred as resource elements in LTE network. Refer LTE
Terminology
.
Question-3: What are the LTE logical, transport and physical channels? Answer-3:All these
channels help LTE UE establish the connection with the eNodeB, maintain the connection and
terminate the same. Logical channels are characterized by the information that is transferred.
Transport channels are characterized by how the data are transferred over the radio interface.
Physical channel corresponds to a set of resource elements used by the physical layer. Channels
are further divided into control channel and traffic channel at logical channel stage. Read more.
Question-4: Explain the difference between Reference signal (RS) and synchronization signal
(SS) in the LTE? Also mention types of RS and SS.
Answer-4:Reference signal (RS) is used as pilot subcarrier in LTE similar to other broadband
wireless technologies such as WLAN, WIMAX etc. Synchronization signal is used as preamble
sequence in LTE for synchronization purpose. RS is used for channel estimation and tracking. SS
are of two types viz. P-SS and S-SS. P-SS is used for initial synchronization. S-SS is used for
frame boundary determination. RS are of two types viz. Demodulation RS (DRS) and Sounding
RS (SRS). DRS is used for sync and channel estimation purpose. SRS is used for channel quality
estimation purpose. DRS is used in both the uplink and downlink, while SRS is used only in the
uplink. Refer LTE PSS SSS
and LTE RS DMRS SRS
pages to know insight concepts of synchronization signal and reference signal.
3)
4)
Ans:
Intra/Inter Frequency Events:
Event B2 (PCell becomes worse than threshold1 and inter RAT neighbour becomes better than
threshold2)
5)
What is DCI?
6)
7)
8)
9)
Ans:
Radio link failure to be detected:
1) upon T310 expiry
2) upon random access problem indication from MAC while neither T300, T301, T304 nor
T311 is running
3) upon indication from RLC that the maximum number of re-transmissions has been reached
UL data, for a logical channel which belongs to a LCG, becomes available for
transmission in the RLC entity or in the PDCP entity and either the data belongs to a
logical channel with higher priority than the priorities of the logical channels which
belong to any LCG and for which data is already available for transmission, or there is no
data available for transmission for any of the logical channels which belong to a LCG, in
which case the BSR is referred below to as "Regular BSR";
UL resources are allocated and number of padding bits is equal to or larger than the size
of the Buffer Status Report MAC control element plus its subheader, in which case the
BSR is referred below to as "Padding BSR"
retxBSR-Timer expires and the UE has data available for transmission for any of the
logical channels which belong to a LCG, in which case the BSR is referred below to as
"Regular BSR"
periodicBSR-Timer expires, in which case the BSR is referred below to as "Periodic
BSR".
Ans:
For Regular and Periodic BSR:
if more than one LCG has data available for transmission in the TTI where the BSR is
transmitted
report Long BSR
else,
report Short BSR.
if the number of padding bits is equal to or larger than the size of the Short BSR plus its
subheader but smaller than the size of the Long BSR plus its subheader:
if more than one LCG has data available for transmission in the TTI where the BSR is
transmitted: report Truncated BSR of the LCG with the highest priority logical channel with
data available for transmission;
else
report Short BSR.
else if the number of padding bits is equal to or larger than the size of the Long BSR plus its
subheader,
report Long BSR.
R
Timing Advance Command
UL Grant
Temporary C-RNTI
The SECURITY MODE COMMAND message is used to command the UE for the
activation of AS security. E-UTRAN always initiates this procedure prior to the
establishment of Signalling Radio Bearer2 (SRB2) and Data Radio Bearers (DRBs).
AS security comprises of the integrity protection of RRC signalling (SRBs) as well as the
ciphering of RRC signalling (SRBs) and user plane data (DRBs). The integrity protection
algorithm is common for signalling radio bearers SRB1 and SRB2. The ciphering
algorithm is common for all radio bearers (i.e. SRB1, SRB2 andDRBs). Neither integrity
protection nor ciphering applies for SRB0.
The eNodeB sends integrity protected SECURITY MODE COMMAND message to the
UE. The UE shall derive KeNB and KRRCint which is associated with integrity protection
algorithm indicated in the SECURITY MODE COMMAND. Then, UE verifies the
Integrity of the received SECURITY MODE COMMAND by checking the Message
Authentication Code (MAC) in the SECURITY MODE COMMAND message. If
the SECURITY MODE COMMANDmessage fails the integrity protection check, then the
UE sends SECURITY MODE FAILURE to the eNodeB.
If the SECURITY MODE COMMAND passes the integrity protection check, then the UE
shall derive the encryption keys KRRCenc key and the KUPenc keys associated with the
ciphering algorithm indicated in theSECURITY MODE COMMAND.
The UE shall apply integrity protection using the indicated algorithm (EIA) and the
integrity key, KRRCintimmediately, i.e. integrity protection shall be applied to all
subsequent messages received and sent by the UE, including the SECURITY MODE
COMPLETE message.
The UE shall apply ciphering using the indicated algorithm (EEA), KRRCenc key and
the KUPenc key after completing the procedure, i.e. ciphering shall be applied to all
subsequent messages received and sent by the UE, except for the SECURITY MODE
COMPLETE message which is sent un-ciphered.