SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
White Paper

Protocol Signaling Procedures in LTE
By: V. Srinivasa Rao, Senior Architect & Rambabu Gajula, Lead Engineer

Overview

CONTENTS

The exploding growth of the internet and associated services has fueled
the need for more and more bandwidth. Handheld devices are growing
exponentially and thus the need for the services on the move has increased
tremendously. Current 3G technology is able to cope with the demand to
some extent but unable to satisfy the needs completely.

Network Architecture pg. 2

Long Term Evolution (LTE) promises higher data rates, 100Mbps in the
downlink and 50Mbps in the uplink in LTE’s first phase, and will reduce the
data plane latency and supports interoperability with other technologies
such as GSM, GPRS and UMTS. Plus, LTE has support for scalable bandwidth,
from 1.25MHz to 20MHz. All these features make LTE a very attractive
technology for operators as well as the subscribers.
In this paper we briefly touch upon the procedures executed by LTE user
equipment (UE) and the various LTE network elements in order to provide
the services requested by the UE.

Bearers in LTE pg. 2
System Information Broadcasting pg. 3
Tracking Area Update pg. 7
Mobile­­-Originated Data Call pg. 8
Mobile Initiated Data Call Termination pg. 9
Paging pg. 9
Mobile Terminated Data Call pg. 10
Conclusion pg. 10
References pg. 11
Protocol Signaling Procedures in LTE | Radisys White Paper

Network Architecture
In Figure 1, the architecture of the LTE network is
given with the various interfaces between the network
elements; GERAN and UTRAN networks are shown
for completeness.
The functions of the various network elements are:
•	 eNodeB: Radio Resource Management functions,
IP header compression, encryption of user data
streams, selection of an MME, routing of user plane
data to S-GW, scheduling and transmission of
paging message.	
•	 MME: NAS signaling (eMM, eSM) and security,
AS security, tracking area list management, PDN
GW and S-GW selection, handovers (intra- and
inter-LTE), authentication, bearer management.

Figure 1. LTE Network Architecture

•	 S-GW: The local mobility anchor point for intereNodeB handover; downlink packet buffering and
initiation of network-triggered service requests,
lawful interception, accounting on user and QCI
granularity, UL/DL charging per UE.
•	 P-GW: UE IP address allocation, packet filtering
and PDN connectivity, UL and DL service-level
charging, gating and rate enforcement.
Figure 2 shows the protocol stacks at various
LTE network elements.

Figure 2. LTE Control/User Plane Protocol Stacks

Bearers in LTE
In LTE, end-to-end bearers are realized by the EPS
bearers, which are a collection of radio, S1 and S5/S8
bearers. An EPS bearer identity uniquely identifies an
EPS bearer for one UE accessing via E-UTRAN. The
EPS Bearer Identity is allocated by the MME and is
the one that carries the information; usually it carries
the user data.
There are three kinds of bearers in LTE: Radio Bearers,
S1 Bearers and EPS Bearers as depicted in the Figure 3.
In the UE, the uplink TFT maps a traffic flow aggregate
to an EPS bearer in the uplink direction and in PGW the
downlink TFT maps a traffic flow aggregate to an EPS
bearer in the downlink direction. There is much more
complexity than what is summarized here, but for
brevity’s sake it suffices to say that traffic off-loaders

Figure 3. LTE Bearer Architecture

2
Protocol Signaling Procedures in LTE | Radisys White Paper

classify traffic streams using DPI and then, based on
the operator’s policies, offload part of the traffic directly
onto the Internet while sending the remaining traffic
to the core network. Traffic off-loaders typically will
be deployed as “bump-in-the-wire” boxes between the
radio access network (RAN) and the core network (CN);
in the future, some Radio Network Controllers (RNCs)
might include this functionality inside the box.
•	 Radio Bearer: A radio bearer transports the packets
of an EPS bearer between the UE and an eNodeB.
•	 S1 Bearer: An S1 bearer transports the packets
of an EPS bearer between an eNodeB and a S-GW.

Figure 4. System Information Broadcast

•	 S5/S8 Bearer: An S5/S8 bearer transports the
packets of an EPS bearer between the S-GW
and the PDN GW.
There is a one-to-one mapping between radio,
S1 and S5/S8 bearers; this end-to-end EPS bearer
realizes the negotiated QoS for the service.

System Information
Broadcasting
To get service from the network, a UE has to select
the network and camp on a cell. For this to happen,
the UE has to synchronize itself with the network at
the frame and slot level. Afterward, it requires the
information like Network ID (PLMN ID), Tracking Area
ID, Cell ID and the Radio and Core Network capabilities
for its network selection. The network broadcasts this
information to help the UEs in their selection process.
The LTE network supports broadcasting of System
Information in the form of MIBs and SIBs; Figure 4
outlines the system information broadcast procedure.
Once the UE is synchronized with the network at
the frame and slot level, it reads the broadcast
information and selects it (PLMN and cell selection).

Figure 5. MME Configuration Update Procedure

•	 MIB contains cell bandwidth and information
about PHICH and the SFN.
•	 SIB contains list of PLMN IDs, TAC, CellId, CSG
Identity (optional), neighbor cell information, etc.
•	 eNodeB will get most of the elements from
the MME in an S1AP MME Configuration Update
•	 Message on the S1 interface as shown in Figure 5.
This happens after the S1 interface establishment
between eNodeB and MME.

3
Protocol Signaling Procedures in LTE | Radisys White Paper

Random Access Procedure—
System Access
The UE can utilize the services of the network once
it is synchronized in both the downlink as well as the
uplink direction. After the PLMN and Cell selection,
the UE is synchronized with the network in the
downlink direction and now it needs to synchronize
with the network in the Uplink direction. The Random
Access Procedure (RAP) over PRACH is performed by
the UE for this purpose; RAP is characterized as one
procedure independent of cell size and is common
for both FDD & TDD. There are two types of RAPs:
contention-based and non-contention-based.

Figure 6. Contention-Based Random Access Procedure

Contention-based
Random Access Procedure
In this mode, multiple UEs may attempt to access
the network at the same time, thereby resulting
in collisions. The contention is resolved among the
contending UEs in the following 4-step process
(Figure 6):
•	 Step 1: Random Access Preamble on RACH
in uplink
	
Preambles are grouped based on the size of the
L3 message the, UE would like to transmit; this
provides an indication of resource requirements
for the UE to the network.
•	 Step 2: Random Access Response generated
by MAC on DL-SCH
	
This is an indication to the UE that the eNode B
received its Preamble and conveys the resources
reserved for this UE.
•	 Step 3: First scheduled UL transmission on UL-SCH
	 UE sends the RRC Connection Request using
The
the resources given by the eNodeB in Step 2. In the
RRC Connection request message, the UE sends
its identifier to the network and it is used by the
eNodeB to resolve the contention in the next step.
•	 Step 4: Contention Resolution on DL
	 eNodeB echoes back the received UE identifier
The
to resolve the contention, and at this point the
UE which has received its ID continues with the
transmission while others will back off and try again.

Figure 7. Non-Contention-Based Random Access Procedure

Non-Contention-Based
Random Access Procedure
The network initiates this procedure in case of a
handover of a UE from one eNodeB to another in order
to keep handover latency under control. It usually
reserves a set of RACH preambles for this purpose
and will transmit one from that group to the UE. There
are no collisions with other UEs because the eNodeB
controls the procedure, which is shown in Figure 7.
Once the UE receives the assigned RA Preamble, it
sends it to the eNodeB which responds back. Steps
3 and 4 given in the contention-based RAP are not
required here.

4
Protocol Signaling Procedures in LTE | Radisys White Paper

RRC Connection and Initial
Attach Procedure
After the Random Access procedure, if the UE is not
already attached to the network it has to do so by
initiating the attach procedure. Otherwise, the UE
initiates the tracking area update if it changed its
tracking area since the last update. For initiating
any NAS procedure, the UE is required to establish
an RRC connection with the eNodeB. The purpose
of this procedure, depicted in Figure 8, is to request
the resources from the network for its service needs.

Figure 8. RRC Connection Setup

RRC connection establishment involves Signaling Radio
Bearer 1 (SRB1) establishment. The procedure is also
used to transfer the initial NAS message from the UE
to the MME via the eNodeB, the latter of which does
not interpret the NAS message.

NAS Attach Procedure
To get NAS-level services (for example, internet
connectivity) from the network, NAS nodes in the
network have to know about the UE. To facilitate
this; the UE has to initiate the Attach Procedure,
which is mandatory for the UE at power on and
also during the initial access of the network.
Once the attach procedure succeeds, a context is
established for the UE in the MME, and a default
bearer is established between the UE and the PDN
GW and an IP address is allocated to it. Now that the
UE has IP connectivity, it can start using IP-based
internet services or IMS services if the IMS network
is available and if the UE has a subscription for the
same. The NAS Attach procedure is depicted in the
Figure 9 and the steps are given below:

Figure 9. Attach Procedure

1.  E establishes the RRC Connection with the eNodeB.
U
2.  he UE sends the ATTACH REQUEST message
T
together with a PDN CONNECTIVITY REQUEST for
the PDN (IP) connectivity on the established RRC
Connection. As part of this, the eNodeB establishes
the S1 logical connection with the MME for this UE.
3. f the Network is not able to identify the UE with
I
the Identity given in the Attach Request message, it
initiates the identification followed by Authentication
and Security Mode procedures as given in Figure 10.

Figure 10. NAS Common Procedures

5
Protocol Signaling Procedures in LTE | Radisys White Paper

4.  he MME update the HSS with the location of the
T
UE using the Update Location request message
using the Diameter protocol; it also requests the
subscriber profile from the HSS using this message.
5.  he HSS updates its database with the current
T
location of the UE and sends the subscriber profile
information to the MME in the Diameter Update
Location Acknowledge message.
6.  he MME now establishes an eGTP User Tunnel to
T
establish the default bearer at the SGW; it sends a
Create Session Request (eGTP-C protocol) toward
the SGW.
7.  he SGW creates the default bearer for this UE and
T
requests the PGW to create a bearer for this UE
between the SGW and the PGW to provide end-toend bearer connectivity. The PDN-GW then creates
the bearer and allocates an IP Address for the UE.
8.  nce the SGW receives the response from the
O
PGW, it responds with a Create Session Response
to MME.

13. The UE updates its RRC Connection configuration

and responds back with an RRC Connection
Reconfig Complete.
14. The eNodeB now sends the Initial Context Setup

Response to the MME.
15. The MME sends the eGTP-C Modify Bearer

Request to the SGW to update the eNB Tunnel Id
for the default bearer.
16. After updating the information, the SGW responds

with a Modify Bearer Response to the MME.
17. The MME now sends the Attach Accept and

Activate Default Bearer Context Request NAS
message to the UE.
18. If the MME has allocated a GUTI while sending the

Attach Accept, the UE needs to process it and give
back the Attach Complete as a response to it. The
UE piggy-backs the Activate Default EPS bearer
context Accept NAS message to the MME.

NAS Common Procedures

9.  he MME now has to establish the bearer between
T
the eNodeB and SGW. It sends the S1AP Initial
Context Setup Request to the eNodeB to create
a context for this UE, which includes the bearer
Context and the security Context.

The MME can initiate the NAS common procedures
during the initial Attach, Tracking Area Update and
other dedicated NAS procedures. These procedures,
depicted in Figure 10, are used to identify and
authenticate the UE.

10.  fter receiving the Initial Context Setup Request,
A
the eNodeB now establishes the security
parameters with the UE by initiating the AS
Security Mode Command Procedure.

1. The MME sends the identity Request to the UE if

it is unable to retrieve the UE profile from the HSS.

11.  he UE establishes the security parameters
T
(parameters required for ciphering the Integrity
protection) and sends the Security Mode Complete
Message to the eNodeB. From now on, all the
messages exchanged between the UE and eNodeB
on the radio interface are ciphered as well as
integrity-protected.
12.  he eNodeB reconfigures the resources to the UE
T
by sending an RRC Connection Reconfig Request to
the UE. In this message, the eNodeB piggy-backs
the Activate Default EPS Bearer Context Request
NAS message to the UE.

2. The UE responds back with its IMSI in the Identity

Response message to MME.
3.  fter getting the valid IMSI from the UE, the network
A
now authenticates the UE to ascertain whether the
UE is genuine or not. The network and UE share a
secret key (the Authentication Centre stores it in the
network and the SIM card stores it in UE). Using this
secret key and a random number, the network (AuC)
computes a result and expects the UE to give back
the same result as part of this procedure.
4. After receiving the parameters (RAND and A

UTN from the network), the UE computes the
result and gives it back to the network in the
Authentication Response.

6
Protocol Signaling Procedures in LTE | Radisys White Paper

5.  fter successful authentication, the network
A
initiates the Security mode command to encrypt
the NAS messages between the UE and MME;
this is to protect the privacy of the subscriber.
6.  he UE agrees to the Security mode command and
T
sends the response back to the Network. After this
step, both the UE and the network will encrypt the
NAS messages while sending and decrypt them while
receiving. Similarly, NAS messages are integrityprotected from now onwards.

UE Initiated Detach Procedure

Figure 11. UE Initiated Detach

If the UE does not require services from the network,
it needs to deregister itself with the network by
initiating the detach procedure. One example for
this is when the UE is switched off.
This detach procedure is initiated by the UE by
sending a DETACH REQUEST message. The Detach
type IE included in the message indicates whether
detach is due to a “switch off” or not.

Figure 12. Tracking Area Update without Authentication

The network and the UE deactivate the EPS bearer
context(s) for this UE locally without peer-to-peer
signaling between the UE and MME. If the detach
type is a “switch off” then the MME does not send the
Detach Accept, otherwise it does send it to UE. While
processing the Detach from the UE, the MME initiates
the release of the EPS bearers in the network and it
also clears the UE Context held at the eNodeB (not
shown in Figure 11).

Tracking Area Update
After a successful attach to the network, the UE can
roam freely in the current Tracking Area. If it detects a
different tracking area, it needs to update the network
with this new tracking area. Similarly, the network can
request the UE to update its tracking area periodically,
which helps the network in quickly locating the UE
whenever a mobile-terminated call is received by the
network for this UE since it can just page the UE in the
last reported area.

Figure 13. Tracking Area Update with Authentication

During the tracking area updating procedure, the MME
may initiate an authentication procedure and setup a
security context. The Tracking Area Update Procedure
without the Authentication step is given in Figure 12,
and the steps With Authentication and Security mode
command (NAS Common Procedures) included are
given in Figure 13.

7
Protocol Signaling Procedures in LTE | Radisys White Paper

Mobile-Originated Data Call
After successfully attaching to the network, the UE
can request the services from the Network using the
service request procedure. One example scenario is
when the UE requests resources from the Network to
initiate a data call; the UE can utilize the NAS service
request procedure for this purpose. Another example
of this procedure is to invoke MO/MT CS fallback
procedures if they are supported by the network;
the signaling messages involved in this procedure
are given in Figure 14.
1.  he UE establishes the RRC Connection with
T
the eNodeB.
2.  he UE sends the Service Request to the MME and
T
requests (dedicated) bearer resources by including
the Bearer Resource Allocation Req. As part of this,
the eNodeB establishes the S1 logical connection
with the MME for this UE. Note that the UE may also
send the Bearer Resource Allocation Req to the MME
as a standalone message at a later point in time too.
3.  t this point the network can initiate an optional
A
identification followed by Authentication and
Security Mode procedures as given in Figure 10.
4.  fter the completion of the Authentication and
A
Security Mode control procedures, the MME
initiates the activation of default bearer with the
SGW / PGW by initiating the eGTP-C Modify Bearer
Req message toward the SGW.

Figure 14. Mobile-Originated Data Call

9. The PGW responds with a Create Bearer Request

toward the SGW after allocating the dedicated
bearer resource (TFT initialization, etc).
10. The SGW process the Create Bearer Request

and forwards to the MME for further processing.
11.  he MME now sends the E-RAB Setup Req to the
T
eNodeB to allocate the bearer between the eNodeB
and the SGW; it piggy-backs the NAS Activate
Dedicated EPS Bearer Context Req to the UE.
12. The eNodeB allocates the resources for the Radio

Bearers using an RRC Conn Reconfig Req message
to the UE. The eNodeB includes the received NAS
message in it.

5.  fter receiving the Modify Bearer Req, the SGW
A
activates the required resources and forwards
the Modify Bearer Req toward the PDN GW.

13. The UE establishes the Radio bearers and

responds back with an RRC Connection
Reconfiguration Complete Msg to the eNodeB.

6.  he PGW processes the Modify Bearer Req and
T
activates required resources. Note that the IP
Address is allocated during the Attach procedure,
so it will not happen now. It responds back with
the Modify Bearer Response to the SGW and the
SGW forwards it to the MME.

14. Radio Bearers are established between the

eNodeB and the UE by now, so the eNodeB sends
the E-RAB Setup response to the MME.

7.  he MME now initiates the Dedicated Bearer
T
establishment by sending the eGTP-C Bearer
Resource Command to the SGW.
8.  he SGW process the Bearer Resource Command
T
and forwards it to the PGW.

15. The UE now sends the Activate Dedicated EPS

Bearer Context Accept NAS message to the
MME via the eNodeB.
16. The MME sends a Create Bearer Response to the

SGW to complete the Dedicated Bearer Activation.
The SGW forwards it to the PGW.

8
Protocol Signaling Procedures in LTE | Radisys White Paper

Mobile-Initiated Data
Call Termination
Once the UE finishes the Data call it can trigger
the release of the dedicated bearers by sending
the Bearer Resource Modification Req message
to the MME, which can then take care of releasing
the dedicated bearer with the SGW and PGW.
1.  he UE triggers the dedicated bearer release
T
by sending the Bearer Resource Modification
Request to the MME.
2.  he MME initiates an EPS bearer context
T
deactivation procedure by sending the eGTP-C
Bearer Resource Command Msg to the SGW.

Figure 15. Mobile-Initiated Data Call Release

3.  he SGW process the Bearer Resource Command
T
and forwards it to the PGW.
4.  he PGW initiates the Delete Bearer Req msg
T
toward the SGW/MME to clear the requested bearer
resources. The SGW forwards the same to the MME.
5.  he MME initiates the E-RAB Release Command to
T
the eNB to clear the bearer resources. It includes
the NAS Msg: Deactivate EPS Bearer Context Req
message for the UE.
6.  he UE receives the NAS message from the eNB
T
in the DL NAS procedure. It clears the bearer
resources and sends a Deactivate EPS Bearer
Context Accept to the MME.
7.  he eNB now sends the E-RAB Release Response
T
to the MME.
8.  he MME sends the Delete Bearer Response to
T
the SGW and the SGW forwards it to the PGW
after clearing the bearer resources.
9.  he PGW clears the requested Bearer resources.
T
10. f it is the release of the last dedicated bearer
I
for this UE, the MME shall release the Context
associated with this UE by sending an S1AP UE
Context Release Command.
11.  he eNodeB clears the Radio resources allocated
T
to this UE by sending the RRC Connection Release
message to the UE.

Figure 16. Paging Procedure

12. The eNodeB sends the UE Context Release

complete message to the MME.

Paging
The paging procedure is used by the network to
request the establishment of a NAS signaling
connection to the UE. If there is an IP packet that
comes for a UE from the external network to the PGW
and if there is no dedicated bearer existing for the UE,
it will forward the IP packet to the SGW on the default
bearer. Once the packet has reached the SGW on the
default bearer, the SGW detects the need to create
a dedicated bearer and sends the Downlink Data
Notification message to the MME in order the page
the UE and create the dedicated bearers.
Now the MME has to ensure that the UE establishes
an RRC connection, so the MME sends a Paging
Request message to all eNodeBs associated with
the last known Tracking Area.

9
Protocol Signaling Procedures in LTE | Radisys White Paper

Figure 17. Mobile Terminated Data Call

Mobile-Terminated Data Call
For a UE-terminated call, the network sends the
paging request to all the eNodeBs associated with the
last known tracking area as discussed above. When
receiving the Paging Request message from the MME,
the eNodeB sends the paging message over the radio
interface in the cells which are contained within one
of the tracking areas provided in that message.
The UE is normally paged using its S-TMSI or IMSI.
The Paging message also contains a UE identity
index value in order for the eNodeB to calculate the
paging occasions at which the UE listens for paging
message. The procedure is depicted in Figure 17
and explained below:
1.  he PGW/SGW receive the incoming IP packet
T
addressed to a UE.
2.  he SGW sends a DL Data Notification to the
T
MME requesting dedicated UE bearer creation.
3.  he MME now sends a Paging message to notify
T
the UE about the incoming IP Packet.
4.  nce the UE receives the Paging message on the
O
radio interface, it establishes the RRC Connection
with the eNodeB.

5. The UE sends the Service Request to the MME and

includes the Bearer Resource Allocation Request
to request the Dedicated Bearer Establishment.
6. From this point onward, the message sequence is

the same as that outlined in the Mobile Originated
Data Call. Please refer to Figure 14 and its message
sequence explanation.

Conclusion
Existing 3G networks are not able to cope up with
the rate of increasing demand for more and more
bandwidth, which has led to development of new
technology to satisfy subscribers’ bandwidth needs.
With over 100Mbps downlink and 50Mbps uplink
(in the first phase), LTE promises to deliver high
bandwidth on the move.
In this paper we covered the various signaling
procedures executed by the UE and the network
elements in LTE to provide services to the UE. All
of these procedures were explained in the context of
end-to-end signaling and the interactions of various
network elements.

10
Protocol Signaling Procedures in LTE | Radisys White Paper

11

References
3GPP TS 36.300: “Evolved Universal Terrestrial Radio
Access (E-UTRA), Evolved Universal Terrestrial Radio
Access Network (E-UTRAN); Overall Description;
Stage 2”

1

3GPP TS 24.301: “Non-Access-Stratum (NAS)
protocol for Evolved Packet System; Stage 3”

2

3GPP TS 24.302: “Access to the 3GPP Evolved Packet
Core (EPC) via Non-3GPP Access Networks”

3

4

3
 GPP TS 36.331: “Evolved Universal Terrestrial Radio
Access (E-UTRAN); Radio Resource Control (RRC)
Protocol Specification”
3GPP TS 36.401: “Evolved Universal Terrestrial
Radio Access Network (E-UTRAN); Architecture
Description”

5

3GPP TS 36.413: “Evolved Universal Terrestrial Radio
Access Network (E-UTRAN); S1 Application Protocol
(S1AP)”

6

3GPP TS 29.274: “Evolved General Packet Radio
Service (GPRS) Tunneling Control Protocol for Control
Plane (GTPv2-C) Stage 3”

7

Corporate Headquarters
5435 NE Dawson Creek Drive
Hillsboro, OR 97124 USA
503-615-1100 | Fax 503-615-1121
Toll-Free: 800-950-0044
www.radisys.com | info@radisys.com
©2011 Radisys Corporation.
Radisys, Trillium, Continuous Computing and Convedia
are registered trademarks of Radisys Corporation.
*All other trademarks are the properties of their respective owners.
September 2011

Contenu connexe

Tendances

S1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setupS1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setupPrashant Sengar
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guideMorg
 
Lte rrc-connection-setup-messaging
Lte rrc-connection-setup-messagingLte rrc-connection-setup-messaging
Lte rrc-connection-setup-messagingPrashant Sengar
 
Radio resource management and mobiltiy mngmnt
Radio resource management and mobiltiy mngmntRadio resource management and mobiltiy mngmnt
Radio resource management and mobiltiy mngmntabidsyed4u
 
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPP
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPPElementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPP
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPPLouis K. H. Kuo
 
Lte attach-messaging
Lte attach-messagingLte attach-messaging
Lte attach-messagingPraveen Kumar
 
Lte mac presentation
Lte mac presentationLte mac presentation
Lte mac presentationPraveen Kumar
 
How to dimension user traffic in LTE
How to dimension user traffic in LTEHow to dimension user traffic in LTE
How to dimension user traffic in LTEAlthaf Hussain
 
4 lte access transport network dimensioning issue 1.02
4 lte access transport network dimensioning issue 1.024 lte access transport network dimensioning issue 1.02
4 lte access transport network dimensioning issue 1.02saeed_sh65
 
3 lte mac_rrc(조봉열)
3 lte mac_rrc(조봉열)3 lte mac_rrc(조봉열)
3 lte mac_rrc(조봉열)Dattaraj Pangam
 
WC and LTE 4G module 1- 2019 by Prof. Suresha V
WC and LTE 4G  module 1- 2019 by Prof. Suresha VWC and LTE 4G  module 1- 2019 by Prof. Suresha V
WC and LTE 4G module 1- 2019 by Prof. Suresha VSURESHA V
 
LTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang ShanLTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang ShanDarren Pauli
 
LTE RADIO PROTOCOLS
LTE RADIO PROTOCOLSLTE RADIO PROTOCOLS
LTE RADIO PROTOCOLSbrkavyashree
 
4G LTE Presentation Group 9
4G LTE Presentation Group 94G LTE Presentation Group 9
4G LTE Presentation Group 9eel4514team9
 

Tendances (20)

S1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setupS1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setup
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guide
 
Lte imp
Lte impLte imp
Lte imp
 
Lte model drx
Lte model drxLte model drx
Lte model drx
 
Lte rrc-connection-setup-messaging
Lte rrc-connection-setup-messagingLte rrc-connection-setup-messaging
Lte rrc-connection-setup-messaging
 
Radio resource management and mobiltiy mngmnt
Radio resource management and mobiltiy mngmntRadio resource management and mobiltiy mngmnt
Radio resource management and mobiltiy mngmnt
 
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPP
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPPElementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPP
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPP
 
Lte attach-messaging
Lte attach-messagingLte attach-messaging
Lte attach-messaging
 
Lte mac presentation
Lte mac presentationLte mac presentation
Lte mac presentation
 
How to dimension user traffic in LTE
How to dimension user traffic in LTEHow to dimension user traffic in LTE
How to dimension user traffic in LTE
 
Anritsu lte guide
Anritsu lte guideAnritsu lte guide
Anritsu lte guide
 
Lte signaling
Lte signalingLte signaling
Lte signaling
 
4 lte access transport network dimensioning issue 1.02
4 lte access transport network dimensioning issue 1.024 lte access transport network dimensioning issue 1.02
4 lte access transport network dimensioning issue 1.02
 
EPS presentation
EPS presentationEPS presentation
EPS presentation
 
3 lte mac_rrc(조봉열)
3 lte mac_rrc(조봉열)3 lte mac_rrc(조봉열)
3 lte mac_rrc(조봉열)
 
WC and LTE 4G module 1- 2019 by Prof. Suresha V
WC and LTE 4G  module 1- 2019 by Prof. Suresha VWC and LTE 4G  module 1- 2019 by Prof. Suresha V
WC and LTE 4G module 1- 2019 by Prof. Suresha V
 
LTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang ShanLTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang Shan
 
LTE RADIO PROTOCOLS
LTE RADIO PROTOCOLSLTE RADIO PROTOCOLS
LTE RADIO PROTOCOLS
 
4G LTE Presentation Group 9
4G LTE Presentation Group 94G LTE Presentation Group 9
4G LTE Presentation Group 9
 
Lte basic
Lte basicLte basic
Lte basic
 

En vedette

VoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedVoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedAmit Deshmukh
 
Radisys & Mavenir: Monetizing VoLTE and RCS
Radisys & Mavenir: Monetizing VoLTE and RCSRadisys & Mavenir: Monetizing VoLTE and RCS
Radisys & Mavenir: Monetizing VoLTE and RCSRadisys Corporation
 
VoLTE Charging and Clearing Explained
VoLTE Charging and Clearing ExplainedVoLTE Charging and Clearing Explained
VoLTE Charging and Clearing ExplainedSyniverse
 
VoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallVoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallJose Gonzalez
 
LTE Architecture and LTE Attach
LTE Architecture and LTE AttachLTE Architecture and LTE Attach
LTE Architecture and LTE Attachaliirfan04
 
Call flow and MS attach in LTE
Call flow and MS attach in LTECall flow and MS attach in LTE
Call flow and MS attach in LTEShashank Asthana
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology EssentialsHussien Mahmoud
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flowassinha
 

En vedette (10)

VoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2ErevisedVoLTE_SRVCC_E2Erevised
VoLTE_SRVCC_E2Erevised
 
Radisys & Mavenir: Monetizing VoLTE and RCS
Radisys & Mavenir: Monetizing VoLTE and RCSRadisys & Mavenir: Monetizing VoLTE and RCS
Radisys & Mavenir: Monetizing VoLTE and RCS
 
VoLTE Charging and Clearing Explained
VoLTE Charging and Clearing ExplainedVoLTE Charging and Clearing Explained
VoLTE Charging and Clearing Explained
 
VoLTE Testing Explained
VoLTE Testing ExplainedVoLTE Testing Explained
VoLTE Testing Explained
 
Volte Introduction
Volte IntroductionVolte Introduction
Volte Introduction
 
VoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallVoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice Call
 
LTE Architecture and LTE Attach
LTE Architecture and LTE AttachLTE Architecture and LTE Attach
LTE Architecture and LTE Attach
 
Call flow and MS attach in LTE
Call flow and MS attach in LTECall flow and MS attach in LTE
Call flow and MS attach in LTE
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology Essentials
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flow
 

Similaire à Paper lte-protocol-signaling

4G-Questions interview.pdf
4G-Questions interview.pdf4G-Questions interview.pdf
4G-Questions interview.pdfMohamedShabana37
 
Lte call flows_att_best_practices_lte_pe
Lte call flows_att_best_practices_lte_peLte call flows_att_best_practices_lte_pe
Lte call flows_att_best_practices_lte_peHatim100
 
Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-Amir Mehdi Ahmadian
 
intro to 4G.ppt
intro to 4G.pptintro to 4G.ppt
intro to 4G.pptITLAb21
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...ijsrd.com
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionGuisun Han
 
Lte training an introduction-to-lte-basics
Lte training an introduction-to-lte-basicsLte training an introduction-to-lte-basics
Lte training an introduction-to-lte-basicsSaurabh Verma
 
Netmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdf
Netmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdfNetmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdf
Netmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdfmanasa718411
 
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VWC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VSURESHA V
 
Simulation_of_LTE_signaling.pdf
Simulation_of_LTE_signaling.pdfSimulation_of_LTE_signaling.pdf
Simulation_of_LTE_signaling.pdfFitsum Mergia
 
Mobile computing – module 6
Mobile computing – module 6  Mobile computing – module 6
Mobile computing – module 6 JIGNESH PATEL
 
15EC81 - Robin Singla.pdf
15EC81 - Robin Singla.pdf15EC81 - Robin Singla.pdf
15EC81 - Robin Singla.pdfsantosh147365
 

Similaire à Paper lte-protocol-signaling (20)

4G-Questions interview.pdf
4G-Questions interview.pdf4G-Questions interview.pdf
4G-Questions interview.pdf
 
Lte call flows_att_best_practices_lte_pe
Lte call flows_att_best_practices_lte_peLte call flows_att_best_practices_lte_pe
Lte call flows_att_best_practices_lte_pe
 
LTE optimization
LTE optimizationLTE optimization
LTE optimization
 
Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-
 
1605.01126
1605.011261605.01126
1605.01126
 
intro to 4G.ppt
intro to 4G.pptintro to 4G.ppt
intro to 4G.ppt
 
LTE
LTELTE
LTE
 
EVERYTHING IN LTE
EVERYTHING IN LTEEVERYTHING IN LTE
EVERYTHING IN LTE
 
J0343073079
J0343073079J0343073079
J0343073079
 
Csfb
CsfbCsfb
Csfb
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
 
Paper lte-srvcc
Paper lte-srvccPaper lte-srvcc
Paper lte-srvcc
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) Introduction
 
Lte training an introduction-to-lte-basics
Lte training an introduction-to-lte-basicsLte training an introduction-to-lte-basics
Lte training an introduction-to-lte-basics
 
Lte questions adv
Lte questions advLte questions adv
Lte questions adv
 
Netmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdf
Netmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdfNetmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdf
Netmanias.2014.02.09-EMM Procedure 4. Service Request (En).pdf
 
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VWC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
 
Simulation_of_LTE_signaling.pdf
Simulation_of_LTE_signaling.pdfSimulation_of_LTE_signaling.pdf
Simulation_of_LTE_signaling.pdf
 
Mobile computing – module 6
Mobile computing – module 6  Mobile computing – module 6
Mobile computing – module 6
 
15EC81 - Robin Singla.pdf
15EC81 - Robin Singla.pdf15EC81 - Robin Singla.pdf
15EC81 - Robin Singla.pdf
 

Dernier

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Paper lte-protocol-signaling

  • 1. White Paper Protocol Signaling Procedures in LTE By: V. Srinivasa Rao, Senior Architect & Rambabu Gajula, Lead Engineer Overview CONTENTS The exploding growth of the internet and associated services has fueled the need for more and more bandwidth. Handheld devices are growing exponentially and thus the need for the services on the move has increased tremendously. Current 3G technology is able to cope with the demand to some extent but unable to satisfy the needs completely. Network Architecture pg. 2 Long Term Evolution (LTE) promises higher data rates, 100Mbps in the downlink and 50Mbps in the uplink in LTE’s first phase, and will reduce the data plane latency and supports interoperability with other technologies such as GSM, GPRS and UMTS. Plus, LTE has support for scalable bandwidth, from 1.25MHz to 20MHz. All these features make LTE a very attractive technology for operators as well as the subscribers. In this paper we briefly touch upon the procedures executed by LTE user equipment (UE) and the various LTE network elements in order to provide the services requested by the UE. Bearers in LTE pg. 2 System Information Broadcasting pg. 3 Tracking Area Update pg. 7 Mobile­­-Originated Data Call pg. 8 Mobile Initiated Data Call Termination pg. 9 Paging pg. 9 Mobile Terminated Data Call pg. 10 Conclusion pg. 10 References pg. 11
  • 2. Protocol Signaling Procedures in LTE | Radisys White Paper Network Architecture In Figure 1, the architecture of the LTE network is given with the various interfaces between the network elements; GERAN and UTRAN networks are shown for completeness. The functions of the various network elements are: • eNodeB: Radio Resource Management functions, IP header compression, encryption of user data streams, selection of an MME, routing of user plane data to S-GW, scheduling and transmission of paging message. • MME: NAS signaling (eMM, eSM) and security, AS security, tracking area list management, PDN GW and S-GW selection, handovers (intra- and inter-LTE), authentication, bearer management. Figure 1. LTE Network Architecture • S-GW: The local mobility anchor point for intereNodeB handover; downlink packet buffering and initiation of network-triggered service requests, lawful interception, accounting on user and QCI granularity, UL/DL charging per UE. • P-GW: UE IP address allocation, packet filtering and PDN connectivity, UL and DL service-level charging, gating and rate enforcement. Figure 2 shows the protocol stacks at various LTE network elements. Figure 2. LTE Control/User Plane Protocol Stacks Bearers in LTE In LTE, end-to-end bearers are realized by the EPS bearers, which are a collection of radio, S1 and S5/S8 bearers. An EPS bearer identity uniquely identifies an EPS bearer for one UE accessing via E-UTRAN. The EPS Bearer Identity is allocated by the MME and is the one that carries the information; usually it carries the user data. There are three kinds of bearers in LTE: Radio Bearers, S1 Bearers and EPS Bearers as depicted in the Figure 3. In the UE, the uplink TFT maps a traffic flow aggregate to an EPS bearer in the uplink direction and in PGW the downlink TFT maps a traffic flow aggregate to an EPS bearer in the downlink direction. There is much more complexity than what is summarized here, but for brevity’s sake it suffices to say that traffic off-loaders Figure 3. LTE Bearer Architecture 2
  • 3. Protocol Signaling Procedures in LTE | Radisys White Paper classify traffic streams using DPI and then, based on the operator’s policies, offload part of the traffic directly onto the Internet while sending the remaining traffic to the core network. Traffic off-loaders typically will be deployed as “bump-in-the-wire” boxes between the radio access network (RAN) and the core network (CN); in the future, some Radio Network Controllers (RNCs) might include this functionality inside the box. • Radio Bearer: A radio bearer transports the packets of an EPS bearer between the UE and an eNodeB. • S1 Bearer: An S1 bearer transports the packets of an EPS bearer between an eNodeB and a S-GW. Figure 4. System Information Broadcast • S5/S8 Bearer: An S5/S8 bearer transports the packets of an EPS bearer between the S-GW and the PDN GW. There is a one-to-one mapping between radio, S1 and S5/S8 bearers; this end-to-end EPS bearer realizes the negotiated QoS for the service. System Information Broadcasting To get service from the network, a UE has to select the network and camp on a cell. For this to happen, the UE has to synchronize itself with the network at the frame and slot level. Afterward, it requires the information like Network ID (PLMN ID), Tracking Area ID, Cell ID and the Radio and Core Network capabilities for its network selection. The network broadcasts this information to help the UEs in their selection process. The LTE network supports broadcasting of System Information in the form of MIBs and SIBs; Figure 4 outlines the system information broadcast procedure. Once the UE is synchronized with the network at the frame and slot level, it reads the broadcast information and selects it (PLMN and cell selection). Figure 5. MME Configuration Update Procedure • MIB contains cell bandwidth and information about PHICH and the SFN. • SIB contains list of PLMN IDs, TAC, CellId, CSG Identity (optional), neighbor cell information, etc. • eNodeB will get most of the elements from the MME in an S1AP MME Configuration Update • Message on the S1 interface as shown in Figure 5. This happens after the S1 interface establishment between eNodeB and MME. 3
  • 4. Protocol Signaling Procedures in LTE | Radisys White Paper Random Access Procedure— System Access The UE can utilize the services of the network once it is synchronized in both the downlink as well as the uplink direction. After the PLMN and Cell selection, the UE is synchronized with the network in the downlink direction and now it needs to synchronize with the network in the Uplink direction. The Random Access Procedure (RAP) over PRACH is performed by the UE for this purpose; RAP is characterized as one procedure independent of cell size and is common for both FDD & TDD. There are two types of RAPs: contention-based and non-contention-based. Figure 6. Contention-Based Random Access Procedure Contention-based Random Access Procedure In this mode, multiple UEs may attempt to access the network at the same time, thereby resulting in collisions. The contention is resolved among the contending UEs in the following 4-step process (Figure 6): • Step 1: Random Access Preamble on RACH in uplink Preambles are grouped based on the size of the L3 message the, UE would like to transmit; this provides an indication of resource requirements for the UE to the network. • Step 2: Random Access Response generated by MAC on DL-SCH This is an indication to the UE that the eNode B received its Preamble and conveys the resources reserved for this UE. • Step 3: First scheduled UL transmission on UL-SCH UE sends the RRC Connection Request using The the resources given by the eNodeB in Step 2. In the RRC Connection request message, the UE sends its identifier to the network and it is used by the eNodeB to resolve the contention in the next step. • Step 4: Contention Resolution on DL eNodeB echoes back the received UE identifier The to resolve the contention, and at this point the UE which has received its ID continues with the transmission while others will back off and try again. Figure 7. Non-Contention-Based Random Access Procedure Non-Contention-Based Random Access Procedure The network initiates this procedure in case of a handover of a UE from one eNodeB to another in order to keep handover latency under control. It usually reserves a set of RACH preambles for this purpose and will transmit one from that group to the UE. There are no collisions with other UEs because the eNodeB controls the procedure, which is shown in Figure 7. Once the UE receives the assigned RA Preamble, it sends it to the eNodeB which responds back. Steps 3 and 4 given in the contention-based RAP are not required here. 4
  • 5. Protocol Signaling Procedures in LTE | Radisys White Paper RRC Connection and Initial Attach Procedure After the Random Access procedure, if the UE is not already attached to the network it has to do so by initiating the attach procedure. Otherwise, the UE initiates the tracking area update if it changed its tracking area since the last update. For initiating any NAS procedure, the UE is required to establish an RRC connection with the eNodeB. The purpose of this procedure, depicted in Figure 8, is to request the resources from the network for its service needs. Figure 8. RRC Connection Setup RRC connection establishment involves Signaling Radio Bearer 1 (SRB1) establishment. The procedure is also used to transfer the initial NAS message from the UE to the MME via the eNodeB, the latter of which does not interpret the NAS message. NAS Attach Procedure To get NAS-level services (for example, internet connectivity) from the network, NAS nodes in the network have to know about the UE. To facilitate this; the UE has to initiate the Attach Procedure, which is mandatory for the UE at power on and also during the initial access of the network. Once the attach procedure succeeds, a context is established for the UE in the MME, and a default bearer is established between the UE and the PDN GW and an IP address is allocated to it. Now that the UE has IP connectivity, it can start using IP-based internet services or IMS services if the IMS network is available and if the UE has a subscription for the same. The NAS Attach procedure is depicted in the Figure 9 and the steps are given below: Figure 9. Attach Procedure 1. E establishes the RRC Connection with the eNodeB. U 2. he UE sends the ATTACH REQUEST message T together with a PDN CONNECTIVITY REQUEST for the PDN (IP) connectivity on the established RRC Connection. As part of this, the eNodeB establishes the S1 logical connection with the MME for this UE. 3. f the Network is not able to identify the UE with I the Identity given in the Attach Request message, it initiates the identification followed by Authentication and Security Mode procedures as given in Figure 10. Figure 10. NAS Common Procedures 5
  • 6. Protocol Signaling Procedures in LTE | Radisys White Paper 4. he MME update the HSS with the location of the T UE using the Update Location request message using the Diameter protocol; it also requests the subscriber profile from the HSS using this message. 5. he HSS updates its database with the current T location of the UE and sends the subscriber profile information to the MME in the Diameter Update Location Acknowledge message. 6. he MME now establishes an eGTP User Tunnel to T establish the default bearer at the SGW; it sends a Create Session Request (eGTP-C protocol) toward the SGW. 7. he SGW creates the default bearer for this UE and T requests the PGW to create a bearer for this UE between the SGW and the PGW to provide end-toend bearer connectivity. The PDN-GW then creates the bearer and allocates an IP Address for the UE. 8. nce the SGW receives the response from the O PGW, it responds with a Create Session Response to MME. 13. The UE updates its RRC Connection configuration and responds back with an RRC Connection Reconfig Complete. 14. The eNodeB now sends the Initial Context Setup Response to the MME. 15. The MME sends the eGTP-C Modify Bearer Request to the SGW to update the eNB Tunnel Id for the default bearer. 16. After updating the information, the SGW responds with a Modify Bearer Response to the MME. 17. The MME now sends the Attach Accept and Activate Default Bearer Context Request NAS message to the UE. 18. If the MME has allocated a GUTI while sending the Attach Accept, the UE needs to process it and give back the Attach Complete as a response to it. The UE piggy-backs the Activate Default EPS bearer context Accept NAS message to the MME. NAS Common Procedures 9. he MME now has to establish the bearer between T the eNodeB and SGW. It sends the S1AP Initial Context Setup Request to the eNodeB to create a context for this UE, which includes the bearer Context and the security Context. The MME can initiate the NAS common procedures during the initial Attach, Tracking Area Update and other dedicated NAS procedures. These procedures, depicted in Figure 10, are used to identify and authenticate the UE. 10. fter receiving the Initial Context Setup Request, A the eNodeB now establishes the security parameters with the UE by initiating the AS Security Mode Command Procedure. 1. The MME sends the identity Request to the UE if it is unable to retrieve the UE profile from the HSS. 11. he UE establishes the security parameters T (parameters required for ciphering the Integrity protection) and sends the Security Mode Complete Message to the eNodeB. From now on, all the messages exchanged between the UE and eNodeB on the radio interface are ciphered as well as integrity-protected. 12. he eNodeB reconfigures the resources to the UE T by sending an RRC Connection Reconfig Request to the UE. In this message, the eNodeB piggy-backs the Activate Default EPS Bearer Context Request NAS message to the UE. 2. The UE responds back with its IMSI in the Identity Response message to MME. 3. fter getting the valid IMSI from the UE, the network A now authenticates the UE to ascertain whether the UE is genuine or not. The network and UE share a secret key (the Authentication Centre stores it in the network and the SIM card stores it in UE). Using this secret key and a random number, the network (AuC) computes a result and expects the UE to give back the same result as part of this procedure. 4. After receiving the parameters (RAND and A UTN from the network), the UE computes the result and gives it back to the network in the Authentication Response. 6
  • 7. Protocol Signaling Procedures in LTE | Radisys White Paper 5. fter successful authentication, the network A initiates the Security mode command to encrypt the NAS messages between the UE and MME; this is to protect the privacy of the subscriber. 6. he UE agrees to the Security mode command and T sends the response back to the Network. After this step, both the UE and the network will encrypt the NAS messages while sending and decrypt them while receiving. Similarly, NAS messages are integrityprotected from now onwards. UE Initiated Detach Procedure Figure 11. UE Initiated Detach If the UE does not require services from the network, it needs to deregister itself with the network by initiating the detach procedure. One example for this is when the UE is switched off. This detach procedure is initiated by the UE by sending a DETACH REQUEST message. The Detach type IE included in the message indicates whether detach is due to a “switch off” or not. Figure 12. Tracking Area Update without Authentication The network and the UE deactivate the EPS bearer context(s) for this UE locally without peer-to-peer signaling between the UE and MME. If the detach type is a “switch off” then the MME does not send the Detach Accept, otherwise it does send it to UE. While processing the Detach from the UE, the MME initiates the release of the EPS bearers in the network and it also clears the UE Context held at the eNodeB (not shown in Figure 11). Tracking Area Update After a successful attach to the network, the UE can roam freely in the current Tracking Area. If it detects a different tracking area, it needs to update the network with this new tracking area. Similarly, the network can request the UE to update its tracking area periodically, which helps the network in quickly locating the UE whenever a mobile-terminated call is received by the network for this UE since it can just page the UE in the last reported area. Figure 13. Tracking Area Update with Authentication During the tracking area updating procedure, the MME may initiate an authentication procedure and setup a security context. The Tracking Area Update Procedure without the Authentication step is given in Figure 12, and the steps With Authentication and Security mode command (NAS Common Procedures) included are given in Figure 13. 7
  • 8. Protocol Signaling Procedures in LTE | Radisys White Paper Mobile-Originated Data Call After successfully attaching to the network, the UE can request the services from the Network using the service request procedure. One example scenario is when the UE requests resources from the Network to initiate a data call; the UE can utilize the NAS service request procedure for this purpose. Another example of this procedure is to invoke MO/MT CS fallback procedures if they are supported by the network; the signaling messages involved in this procedure are given in Figure 14. 1. he UE establishes the RRC Connection with T the eNodeB. 2. he UE sends the Service Request to the MME and T requests (dedicated) bearer resources by including the Bearer Resource Allocation Req. As part of this, the eNodeB establishes the S1 logical connection with the MME for this UE. Note that the UE may also send the Bearer Resource Allocation Req to the MME as a standalone message at a later point in time too. 3. t this point the network can initiate an optional A identification followed by Authentication and Security Mode procedures as given in Figure 10. 4. fter the completion of the Authentication and A Security Mode control procedures, the MME initiates the activation of default bearer with the SGW / PGW by initiating the eGTP-C Modify Bearer Req message toward the SGW. Figure 14. Mobile-Originated Data Call 9. The PGW responds with a Create Bearer Request toward the SGW after allocating the dedicated bearer resource (TFT initialization, etc). 10. The SGW process the Create Bearer Request and forwards to the MME for further processing. 11. he MME now sends the E-RAB Setup Req to the T eNodeB to allocate the bearer between the eNodeB and the SGW; it piggy-backs the NAS Activate Dedicated EPS Bearer Context Req to the UE. 12. The eNodeB allocates the resources for the Radio Bearers using an RRC Conn Reconfig Req message to the UE. The eNodeB includes the received NAS message in it. 5. fter receiving the Modify Bearer Req, the SGW A activates the required resources and forwards the Modify Bearer Req toward the PDN GW. 13. The UE establishes the Radio bearers and responds back with an RRC Connection Reconfiguration Complete Msg to the eNodeB. 6. he PGW processes the Modify Bearer Req and T activates required resources. Note that the IP Address is allocated during the Attach procedure, so it will not happen now. It responds back with the Modify Bearer Response to the SGW and the SGW forwards it to the MME. 14. Radio Bearers are established between the eNodeB and the UE by now, so the eNodeB sends the E-RAB Setup response to the MME. 7. he MME now initiates the Dedicated Bearer T establishment by sending the eGTP-C Bearer Resource Command to the SGW. 8. he SGW process the Bearer Resource Command T and forwards it to the PGW. 15. The UE now sends the Activate Dedicated EPS Bearer Context Accept NAS message to the MME via the eNodeB. 16. The MME sends a Create Bearer Response to the SGW to complete the Dedicated Bearer Activation. The SGW forwards it to the PGW. 8
  • 9. Protocol Signaling Procedures in LTE | Radisys White Paper Mobile-Initiated Data Call Termination Once the UE finishes the Data call it can trigger the release of the dedicated bearers by sending the Bearer Resource Modification Req message to the MME, which can then take care of releasing the dedicated bearer with the SGW and PGW. 1. he UE triggers the dedicated bearer release T by sending the Bearer Resource Modification Request to the MME. 2. he MME initiates an EPS bearer context T deactivation procedure by sending the eGTP-C Bearer Resource Command Msg to the SGW. Figure 15. Mobile-Initiated Data Call Release 3. he SGW process the Bearer Resource Command T and forwards it to the PGW. 4. he PGW initiates the Delete Bearer Req msg T toward the SGW/MME to clear the requested bearer resources. The SGW forwards the same to the MME. 5. he MME initiates the E-RAB Release Command to T the eNB to clear the bearer resources. It includes the NAS Msg: Deactivate EPS Bearer Context Req message for the UE. 6. he UE receives the NAS message from the eNB T in the DL NAS procedure. It clears the bearer resources and sends a Deactivate EPS Bearer Context Accept to the MME. 7. he eNB now sends the E-RAB Release Response T to the MME. 8. he MME sends the Delete Bearer Response to T the SGW and the SGW forwards it to the PGW after clearing the bearer resources. 9. he PGW clears the requested Bearer resources. T 10. f it is the release of the last dedicated bearer I for this UE, the MME shall release the Context associated with this UE by sending an S1AP UE Context Release Command. 11. he eNodeB clears the Radio resources allocated T to this UE by sending the RRC Connection Release message to the UE. Figure 16. Paging Procedure 12. The eNodeB sends the UE Context Release complete message to the MME. Paging The paging procedure is used by the network to request the establishment of a NAS signaling connection to the UE. If there is an IP packet that comes for a UE from the external network to the PGW and if there is no dedicated bearer existing for the UE, it will forward the IP packet to the SGW on the default bearer. Once the packet has reached the SGW on the default bearer, the SGW detects the need to create a dedicated bearer and sends the Downlink Data Notification message to the MME in order the page the UE and create the dedicated bearers. Now the MME has to ensure that the UE establishes an RRC connection, so the MME sends a Paging Request message to all eNodeBs associated with the last known Tracking Area. 9
  • 10. Protocol Signaling Procedures in LTE | Radisys White Paper Figure 17. Mobile Terminated Data Call Mobile-Terminated Data Call For a UE-terminated call, the network sends the paging request to all the eNodeBs associated with the last known tracking area as discussed above. When receiving the Paging Request message from the MME, the eNodeB sends the paging message over the radio interface in the cells which are contained within one of the tracking areas provided in that message. The UE is normally paged using its S-TMSI or IMSI. The Paging message also contains a UE identity index value in order for the eNodeB to calculate the paging occasions at which the UE listens for paging message. The procedure is depicted in Figure 17 and explained below: 1. he PGW/SGW receive the incoming IP packet T addressed to a UE. 2. he SGW sends a DL Data Notification to the T MME requesting dedicated UE bearer creation. 3. he MME now sends a Paging message to notify T the UE about the incoming IP Packet. 4. nce the UE receives the Paging message on the O radio interface, it establishes the RRC Connection with the eNodeB. 5. The UE sends the Service Request to the MME and includes the Bearer Resource Allocation Request to request the Dedicated Bearer Establishment. 6. From this point onward, the message sequence is the same as that outlined in the Mobile Originated Data Call. Please refer to Figure 14 and its message sequence explanation. Conclusion Existing 3G networks are not able to cope up with the rate of increasing demand for more and more bandwidth, which has led to development of new technology to satisfy subscribers’ bandwidth needs. With over 100Mbps downlink and 50Mbps uplink (in the first phase), LTE promises to deliver high bandwidth on the move. In this paper we covered the various signaling procedures executed by the UE and the network elements in LTE to provide services to the UE. All of these procedures were explained in the context of end-to-end signaling and the interactions of various network elements. 10
  • 11. Protocol Signaling Procedures in LTE | Radisys White Paper 11 References 3GPP TS 36.300: “Evolved Universal Terrestrial Radio Access (E-UTRA), Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall Description; Stage 2” 1 3GPP TS 24.301: “Non-Access-Stratum (NAS) protocol for Evolved Packet System; Stage 3” 2 3GPP TS 24.302: “Access to the 3GPP Evolved Packet Core (EPC) via Non-3GPP Access Networks” 3 4 3 GPP TS 36.331: “Evolved Universal Terrestrial Radio Access (E-UTRAN); Radio Resource Control (RRC) Protocol Specification” 3GPP TS 36.401: “Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Architecture Description” 5 3GPP TS 36.413: “Evolved Universal Terrestrial Radio Access Network (E-UTRAN); S1 Application Protocol (S1AP)” 6 3GPP TS 29.274: “Evolved General Packet Radio Service (GPRS) Tunneling Control Protocol for Control Plane (GTPv2-C) Stage 3” 7 Corporate Headquarters 5435 NE Dawson Creek Drive Hillsboro, OR 97124 USA 503-615-1100 | Fax 503-615-1121 Toll-Free: 800-950-0044 www.radisys.com | info@radisys.com ©2011 Radisys Corporation. Radisys, Trillium, Continuous Computing and Convedia are registered trademarks of Radisys Corporation. *All other trademarks are the properties of their respective owners. September 2011