Академический Документы
Профессиональный Документы
Культура Документы
Disclaimer
The contents of this document are subject to revision without notice due to
continued progress in methodology, design and manufacturing. Ericsson shall
have no liability for any error or damage of any kind resulting from the use
of this document.
Trademark List
All trademarks mentioned herein are the property of their respective owners.
These are shown in the document Trademark Information.
Contents
2 Feature Summary 5
2.1 16-QAM Uplink 5
2.2 64-QAM Downlink 5
2.3 Access Control Lists 5
2.4 Adjustable CRS Power 5
2.5 Admission Control 5
2.6 Autointegration of RBS 6
2.7 Basic Load Management 6
2.8 Battery Test 6
2.9 Bridged Virtual Interface 6
2.10 Cascadable Radio Units 7
2.11 Cascaded RET Support 7
2.12 Certificate Handling 7
2.13 Clock Source over NTP 7
2.14 CMPv2 8
2.15 Contention Free Random Access 8
2.16 CPRI Link Observability 8
2.17 Dual Band Support 8
2.18 Dynamic Cell Status 8
2.19 Emergency Call Prioritization 8
2.20 Enhanced Observability 9
2.21 eNodeB ID in X2 Traces 9
2.22 Ethernet Switching 9
2.23 Fallback from Time and Phase Synchronization 9
2.24 Firmware Download of Antenna Line Devices 10
2.25 Fractional Pathloss Power Control 10
2.26 ICIC - Autonomous Resource Allocation 10
2.27 Idle Mode Support 10
2.28 Intra-LTE Handover 10
2.29 IP Loopback Interface 10
2.30 Jumbo Frames 11
If a feature is not listed or only listed for one of the node types in the Basic
Features table, see if the feature is listed in Licensed Feature Overview.
2 Feature Summary
The main purpose of introducing the Access Control Lists (ACL) feature is
to provide Layer 3 firewall functionality for ingress and egress traffic on IP
interfaces. The operator can use this functionality to prevent unwanted
and/or malicious traffic from entering the node, and to prevent traffic from
unintentionally exiting the node via an interface towards a foreign network
domain.
S1 or X2 this feature controls the load for GBR traffic on the S1-U interface to
keep it below an operator configurable threshold.
The BVI feature is used to provide a gateway for a bridge that connects two
or more network segments. This creates an aggregate Ethernet network, and
allows routed traffic to use a built-in bridge as a link layer.
Cascaded RET units provides means to add tilting capability for antennas to
co-sited base stations without support for RET control.
Trust categories are used for grouping trusted certificates and building
certificate chains.
2.14 CMPv2
Certificate Management Protocol version 2 (CMPv2) is an option for Node
Credential Enrollment.
Not all operators will need to enable this feature, particularly if they are not
experiencing a problems with fragmentation in their network. Others will not
be able to use this feature if their network nodes do not support MTU greater
than 1500 bytes.
2.34 Paging
Paging is used by the core network to notify specific UE in Radio Resource
Control (RRC) RRC_IDLE state about incoming data sessions. Paging
messages are sent by the core network to all RBSs in the tracking area.
2.42 Scheduler
The Scheduler feature distributes radio interface and RBS resources between
various user and control data flows requesting transmission in the cell.
2.51 X2 Configuration
The X2 Configuration feature supports operators in the management of
neighbor relations. It automates the management of X2 connections, data
about external RBSs and data about external cells. Automated behavior
reduces the need for manual configuration and optimization, supporting the
concepts of the self-organizing network.