SlideShare une entreprise Scribd logo
1  sur  41
Télécharger pour lire hors ligne
 1.01朱殿荣修订。根据郭宁反馈修订部分英文表述bug;将文中eNB全部更换为eNodeB;
修订文中部分图片不对其问题guo
 1.02朱殿荣修订。郭宁:
 p10,ip client 改为clock。
 胶片中多处RLP,是否改为RLC?
 另外,overhead这个词,名词解释有包头的意思吗?
 是否应该是header。。。或者用overall header????
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The eNodeB communicates with other NEs through the following five major interfaces:
 The S1 interface exists between the eNodeB and the S-GW/MME. One eNodeB
supports a maximum of 16 S1 interfaces.
 The X2 interface exists between the eNodeBs. It mainly implements the X2
handover function. One eNodeB supports a maximum of 32 X2 interfaces.
 The OM interface, also known as the OM channel, exists between the eNodeB and
the network management system.
 The clock interface, also known as the clock channel, exists between the eNodeB
and the IP clock server. The eNodeB, functioning as the clock client, obtains the
system clock from the clock packets that are periodically sent from the IP clock
server.
 The co-transmission interface, also called co-transmission channel, exists between
the eNodeB and other devices. Traffic of other devices is forwarded through the IP
routing function of the eNodeB. The other device can be a
GSM/CDMA/WiMAX/UMTS/LTE base station or an IP-based device.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The S1 interface can be subdivided into the S1-MME interface supporting Control Plane
signaling between the eNodeB and the MME and the S1-U Interface supporting User Plane
traffic between the eNodeB and the S-GW.
 S1 application protocol supports following functions
 E-RAB Management - this incorporates the setting up, modifying and releasing of
the E-RABs by the MME.
 Initial Context Transfer - this is used to establish an S1UE context in the eNodeB,
setup the default IP connectivity and transfer NAS related signaling.
 UE Capability Information Indication - this is used to inform the MME of the UE
Capability Information.
 Mobility - this incorporates mobility features to support a change in eNodeB or
change in RAT.
 Paging
 S1 Interface Management - this incorporates a number of sub functions dealing
with resets, load balancing and system setup etc.
 NAS Signaling Transport - this is used for the transport of NAS related signaling
over the S1-MME Interface.
 UE Context Modification and Release - this allows for the modification and release
of the established UE Context in the eNodeB and MME respectively.
 Location Reporting - this enables the MME to be made aware of the UEs current
location within the network.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 Defined by the IETF (Internet Engineering Task Force) rather than the 3GPP, SCTP was
developed to overcome the shortfalls in TCP (Transmission Control Protocol) and UDP
when transferring signaling information over an IP bearer. Functions provided by SCTP
include:
 Reliable delivery of higher layer payloads.
 Sequential delivery of higher layer payloads.
 Flow control.
 GTP-U tunnels are used to carry encapsulated PDU (Protocol Data Unit) and signaling
messages between endpoints. Numerous GTP-U tunnels may exist in order to differentiate
between EPS bearer contexts and these are identified through a TEID (Tunnel Endpoint
Identifier).
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 X2 interface interconnects two eNodeBs and in so doing supports both a control plane and
user plane. The principle control plane protocol is X2AP . This resides on SCTP where as
the User Plane IP is transferred using the services of GTP-U and UDP .
 The function of X2 AP is shown as following:
 Mobility Management - this enables the serving eNodeB to move the responsibility
of a specified UE to a target eNodeB. This includes Forwarding the User Plane,
Status Transfer and UE Context Release functions.
 Load Management - this function enables eNodeBs to communicate with each
other in order to report resource status, overload indications and current traffic
loading.
 Error Reporting - this allows for the reporting of general error situations for which
specific error reporting mechanism have not been defined.
 Setting / Resetting X2 - this provides a means by which the X2 interface can be
setup / reset by exchanging the necessary information between the eNodeBs.
 Configuration Update - this allows the updating of application level data which is
needed for two eNodeBs to interoperate over the X2 interface.
 For the SCTP and GTP, it performs the similar functions as it performs in S1 interface.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 IEEE1588 defines the PTP protocol, which applies to the standard Ethernet, with the
precision to microseconds.IEEE1588 V2 released in 2008 mainly incorporates the
improvements on higher frequency accuracy and less impact of the processing delay at the
intermediate transport equipment.
 The IEEE1588 standard targets precise synchronization of distributed and independent
clocks in measurement and control systems. In LTE applications, high-accuracy frequency
synchronization and time synchronization between clock servers and eNodeBs can be
achieved.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 When layer 1 network is adopted as the transport bearer network, the eNodeB and
adjacent NEs are connected through the physical layer. The Synchronous Digital Hierarchy
(SDH) network and Plesiochronous Digital Hierarchy (PDH) network are typical layer 1
networks. The eNodeB supports the access to the SDH/PDH network through the E1/T1
interface. The direct connection through the Ethernet interface, for example, the
connection of the eNodeB and the S-GW through the GE optical cable is a layer 1 network.
The following describes only the E1/T1 connection mode, because the direct connection
mode is rare in the actual situations.
 As shown above, the layer 1 network provides only the bearer function on the physical
layer, which is the simplest transport bearer mode. In this mode, the transmission to the
upper layers is transparent. When using a layer 1 networking solution, users need to
configure the related data concerning the physical layer, such as the attributes of the E1/T1
interface.
 The cost of renting the transport devices is usually high. In the case of the layer 1 network,
the channels are allocated in fixed mode. Therefore, the bandwidth utilization is low.
Besides, the bandwidth needs to be configured for each S1/X2 logical interface.
 The layer 1 transport bearer network is usually applied to the GSM/UMTS system that
provides mainly the CS service. It is rarely applied to the LTE system that provides mainly
the PS service.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The layer 2 network is usually adopted as the transport bearer network of the LTE system.
The layer 2 network in the LTE system is the Ethernet switching network. The major device
is the Ethernet switch. The eNodeB accesses the Ethernet switching network through the
FE/GE interface.
 As shown above, the layer 2 network provides the bearer function on the MAC layer. The
MAC layer is the data link layer protocol of the Ethernet. Complying with the IEEE 802.3,
the MAC layer provides addressing and data access control mechanisms.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The layer 3 network in the LTE system is the IP routing network. The major device is the
router. The eNodeB accesses the IP routing network through the FE/GE interface or the
E1/T1 interface.
 As shown above, the layer 3 network provides the bearer function on the IP layer. Users
need to configure the physical layer, data link layer, and IP layer.
 The configuration of the physical layer and data link layer involves the configuration of the
E1/T1 interface and FE/GE interface.
 The configuration of the IP layer involves the configuration of the IP addresses, IP route list,
and DiffServ.
 The layer 3 network is usually adopted as the transport bearer network of the LTE system.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 MAC provides the interface between the E-UTRA protocols and the E-UTRA Physical Layer.
In doing this it provides the following services:
 Mapping - MAC maps the information received on the LTE Logical Channels into
the LTE transport channels.
 Multiplexing - The information provided to MAC will come from a RB (Radio Bearer)
or multiple Radio Bearers. The MAC layer is able to multiplex different bearers into
the same TB (Transport Block), thus increasing efficiency.
 HARQ (Hybrid Automatic Repeat Request) - MAC utilizes HARQ to provide error
correction services across the air. HARQ is a feature which requires the MAC and
Physical Layers to work closely together.
 Radio Resource Allocation - QoS (Quality of Service) based scheduling of traffic and
signaling to users is provided by MAC.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The RLC protocol exists in the UE and the eNodeB. As its name suggests it provides “radio
link” control, if required. In essence, RLC supports three delivery services to the higher
layers:
 TM (Transparent Mode) - This is utilized for some of the air interface channels, e.g.
broadcast and paging. It provides a connectionless service for signaling.
 UM (Unacknowledged Mode) - This is like Transparent Mode, in that it is a
connectionless service; however it has the additional features of sequencing,
segmentation and concatenation.
 AM (Acknowledged Mode) - This offers an ARQ (Automatic Repeat Request)
service. As such, retransmissions can be used.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 PDCP (Packet Data Convergence Protocol) provides services to both the Control Plane and
User Plane. The main PDCP functions include:
 Header compression and decompression of IP datagrams using the ROHC (Robust
Header Compression) protocol.
 Maintenance of PDCP SN (Sequence Number) for radio bearers operating in RLC
AM (Acknowledged Mode).
 In-sequence delivery of upper layer PDU (Protocol Data Units) at handover.
 Duplicate elimination of lower layer SDUs at handover for RLC AM radio bearers.
 Ciphering and deciphering of User and Control Plane data.
 Integrity protection and integrity verification of the Control Plane data.
 Discarding of data on a timeout basis.
 Discarding of data on a duplicate basis.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 In radio systems, the resources on the LTE-Uu interface are far more precious than the
processing capability of processors. Therefore, ROHC is suitable for radio systems, even
though it is complex compared with earlier schemes. It is mainly used for VoIP services.
 In LTE, the ROHC entity is located within the Packet Data Convergence Protocol (PDCP)
entity on the user planes of the UE and the eNodeB, and is used only for the header
compression and decompression of data packets on the user plane.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 GTP-U tunnels are used to carry encapsulated PDU (Protocol Data Unit) between endpoints
or in the case of the X2 interface.
 Numerous GTP-U tunnels may exist in order to differentiate between EPS bearer contexts
and these are identified through a TEID (Tunnel Endpoint Identifier).
 The average header for GTP-U is 12 bytes, consist of following part
 Version: Specify the GTP protocol version
 P flag: Indicate whether another GTPv2-C message with its own header and body
shall be present at the end of the current message
 T flag: Indicate the presence or not of the TEID field.
 Message Type: Indicate the type of GTP message.
 TEID: Indicate the unique GTP channel. It is unique per EPS bearer for GTP-U and
per PDN connection for GTP-C.
 Sequence Number: Allows in-order delivery of user plane PDU.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 Access control based on IEEE 802.1x ensure the authorized accesses of the eNodeB to the
transport network. For details, see section ‎5.2 "Access Control Based on IEEE 802.1x." To
adapt to the all-IP based transmission mode of the LTE system, the eNodeB uses the IPSec
security mechanism to ensure the confidentiality, integrity, and availability of data
transmission. IPSec services are the security services provided for the IP layer, and thus can
be used by the upper-layer protocols such as the TCP, UDP, ICMP, and SCTP. IPSec is a
protocol family used to guarantee the security for IP communication.
 For transmission of IP packets, IPSec guarantees high-quality and interoperable security
based on cryptology. Ciphering and integrity verification are performed on the IP layer
between specific communicating parties to guarantee the following security features of
packet transmission:
 Data confidentiality: Ciphering protection is performed on user data, which is
transmitted in ciphered text.
 Data integrity: The received data is authenticated to check whether or not the data
is modified.
 Authentication: The data source is authenticated to guarantee that data is
transmitted from an authenticated sender.
 Replay protection: The attack by unauthorized users, who repeatedly transmit the
captured packets, is prevented. The party under the attack does not accept the old
or repeated packets.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 IPSec supports two security protocols: the Authentication Header (AH) protocol and
Encapsulation Security Protocol (ESP) protocol. The AH protocol performs integrity
protection, and the ESP protocol performs both integrity protection and ciphering.
 IPSec supports two packet encapsulation modes: transport mode and tunnel mode. The
difference between the transport mode and the tunnel mode is the IP packet protection
scope.
 Transport mode: protects the effective payload and upper-layer protocols (ULPs) of
IP packets. In transport mode, the IPSec headers (AH or ESP) are placed behind the
IP header and before the ULPs.
 Tunnel mode: protects the security for original IP packets. In tunnel mode, the
original IP packet is encapsulated into a new IP packet, and the IPSec header is
inserted between the headers (AH and/or ESP) of the new and original IP packets.
The header of the original IP packet is protected as part of the effective payload.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 Virtual Local Area Network (VLAN) is a data exchange technology derived from the
traditional LAN.
 VLAN allows LAN devices to be logically grouped into multiple network segments (that is,
smaller LANs) to implement virtual workgroups. The hosts in different VLANs are separated
from each other and they communicate with each other only through routers. A VLAN is a
broadcast domain, that is, a host in a VLAN can receive the broadcast packets from the
other hosts in the same VLAN but cannot receive the broadcast packets from other VLANs.
The VLAN attaches different labels to the operation, administration, and maintenance
(OAM) data and the traffic data. Thus, differentiated services can be provided. The VLAN
also provides services of different priorities and security levels on the MAC layer.
 The VLAN header consists of following parts:
 TPID: Tag protocol identifier, indicate that it is the frame with 802.1Q, the value is
fixed with 0x8100, the length is 2 bytes
 PRI: Priority indicator, 3 bits
 CFI: Canonical Format Indicator, 1 bit
 VLAN ID: Indicate which VLAN belongs to, 12 bits
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 From the capacity dimensioning, we can get throughput of radio interface, including the
overhead of radio interface. So the radio payload throughput can be calculated. During the
IP transport, the additional overhead will be added, from the analysis of overhead, we can
get the throughput of transport layer.
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 PDCP: Packet Data Convergence Protocol, perform data integrity check and ciphering
function.
 ROHC: Robust of head compression, it is a kind of head compression technology
 RLC: Radio link control protocol
 MAC: Perform scheduling control function
 CRC: Cyclic redundancy check
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The LMPT provides four Ethernet interfaces, that is, two optical interfaces (SFP,
100/1000BASE-FX) and two electrical interfaces (RJ45, 10/100/1000BASE-TX). Two
interfaces can be used in combined mode. Multi-mode optical cable or single-mode optical
cable can be used according to the type of the optical module.
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
Course Name
Confidential Information of Huawei. No Spreading Without Permission
N-39
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission

Contenu connexe

Tendances

Lte network planning huawei technologies
Lte network planning huawei technologiesLte network planning huawei technologies
Lte network planning huawei technologiesChaudary Imran
 
Volte troubleshooting
Volte troubleshootingVolte troubleshooting
Volte troubleshootingJamil Awan
 
Lte capacity monitoring
Lte capacity monitoringLte capacity monitoring
Lte capacity monitoringKlajdi Husi
 
RAN - Intro, I&C & Basic Troubleshooting (3).pptx
RAN - Intro, I&C & Basic Troubleshooting (3).pptxRAN - Intro, I&C & Basic Troubleshooting (3).pptx
RAN - Intro, I&C & Basic Troubleshooting (3).pptxFelix Franco
 
4 g lte_drive_test_parameters
4 g lte_drive_test_parameters4 g lte_drive_test_parameters
4 g lte_drive_test_parametersAryan Chaturanan
 
Huawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shopHuawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shopnavaidkhan
 
2.oeo000010 lte handover fault diagnosis issue 1
2.oeo000010 lte handover fault diagnosis issue 12.oeo000010 lte handover fault diagnosis issue 1
2.oeo000010 lte handover fault diagnosis issue 1Klajdi Husi
 
395317358-LTE-Resource-Usage-Optimization.pptx
395317358-LTE-Resource-Usage-Optimization.pptx395317358-LTE-Resource-Usage-Optimization.pptx
395317358-LTE-Resource-Usage-Optimization.pptxSudheeraIndrajith
 
Ericsson important optimization parameters
Ericsson important optimization parametersEricsson important optimization parameters
Ericsson important optimization parametersPagla Knight
 
Radio Measurements in LTE
Radio Measurements in LTERadio Measurements in LTE
Radio Measurements in LTESofian .
 
lte physical layer overview
 lte physical layer overview lte physical layer overview
lte physical layer overviewPraveen Kumar
 
Throughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systemsThroughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systemsPei-Che Chang
 
305090798 04-basic-parameter-planning-rules-v1-1
305090798 04-basic-parameter-planning-rules-v1-1305090798 04-basic-parameter-planning-rules-v1-1
305090798 04-basic-parameter-planning-rules-v1-1Nitin George Thomas
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guideMorg
 
Huawei antenna tdd-8_t8r_antenna_maximize_potentials_of_network
Huawei antenna tdd-8_t8r_antenna_maximize_potentials_of_networkHuawei antenna tdd-8_t8r_antenna_maximize_potentials_of_network
Huawei antenna tdd-8_t8r_antenna_maximize_potentials_of_networkJulio Santana
 
Deep Dive 5G NR-RAN Release 2018 Q4.pptx
Deep Dive 5G NR-RAN Release 2018 Q4.pptxDeep Dive 5G NR-RAN Release 2018 Q4.pptx
Deep Dive 5G NR-RAN Release 2018 Q4.pptxDaniel Estrada
 
Lte network planning_huawei_pdf
Lte network planning_huawei_pdfLte network planning_huawei_pdf
Lte network planning_huawei_pdfNumanKapsal
 

Tendances (20)

Lte network planning huawei technologies
Lte network planning huawei technologiesLte network planning huawei technologies
Lte network planning huawei technologies
 
LTE Optimization
LTE OptimizationLTE Optimization
LTE Optimization
 
Volte troubleshooting
Volte troubleshootingVolte troubleshooting
Volte troubleshooting
 
Lte capacity monitoring
Lte capacity monitoringLte capacity monitoring
Lte capacity monitoring
 
RAN - Intro, I&C & Basic Troubleshooting (3).pptx
RAN - Intro, I&C & Basic Troubleshooting (3).pptxRAN - Intro, I&C & Basic Troubleshooting (3).pptx
RAN - Intro, I&C & Basic Troubleshooting (3).pptx
 
4 g lte_drive_test_parameters
4 g lte_drive_test_parameters4 g lte_drive_test_parameters
4 g lte_drive_test_parameters
 
Huawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shopHuawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shop
 
2.oeo000010 lte handover fault diagnosis issue 1
2.oeo000010 lte handover fault diagnosis issue 12.oeo000010 lte handover fault diagnosis issue 1
2.oeo000010 lte handover fault diagnosis issue 1
 
Handover parameters in_lte
Handover parameters in_lteHandover parameters in_lte
Handover parameters in_lte
 
395317358-LTE-Resource-Usage-Optimization.pptx
395317358-LTE-Resource-Usage-Optimization.pptx395317358-LTE-Resource-Usage-Optimization.pptx
395317358-LTE-Resource-Usage-Optimization.pptx
 
Ericsson important optimization parameters
Ericsson important optimization parametersEricsson important optimization parameters
Ericsson important optimization parameters
 
Radio Measurements in LTE
Radio Measurements in LTERadio Measurements in LTE
Radio Measurements in LTE
 
lte physical layer overview
 lte physical layer overview lte physical layer overview
lte physical layer overview
 
Throughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systemsThroughput calculation for LTE TDD and FDD systems
Throughput calculation for LTE TDD and FDD systems
 
Lte1841
Lte1841Lte1841
Lte1841
 
305090798 04-basic-parameter-planning-rules-v1-1
305090798 04-basic-parameter-planning-rules-v1-1305090798 04-basic-parameter-planning-rules-v1-1
305090798 04-basic-parameter-planning-rules-v1-1
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guide
 
Huawei antenna tdd-8_t8r_antenna_maximize_potentials_of_network
Huawei antenna tdd-8_t8r_antenna_maximize_potentials_of_networkHuawei antenna tdd-8_t8r_antenna_maximize_potentials_of_network
Huawei antenna tdd-8_t8r_antenna_maximize_potentials_of_network
 
Deep Dive 5G NR-RAN Release 2018 Q4.pptx
Deep Dive 5G NR-RAN Release 2018 Q4.pptxDeep Dive 5G NR-RAN Release 2018 Q4.pptx
Deep Dive 5G NR-RAN Release 2018 Q4.pptx
 
Lte network planning_huawei_pdf
Lte network planning_huawei_pdfLte network planning_huawei_pdf
Lte network planning_huawei_pdf
 

En vedette

5.oep100330 lte cell_planning_issue1.10
5.oep100330 lte cell_planning_issue1.105.oep100330 lte cell_planning_issue1.10
5.oep100330 lte cell_planning_issue1.10Wijaya Kusuma
 
WiMAX & LTE Network Introduce For Swift
WiMAX & LTE Network Introduce For SwiftWiMAX & LTE Network Introduce For Swift
WiMAX & LTE Network Introduce For SwiftGozie Lucas ubaozo
 
LTE paging.ppt
LTE paging.pptLTE paging.ppt
LTE paging.pptmravi423
 
Huawei hss9860 v900 r008c20 production description
Huawei hss9860 v900 r008c20 production descriptionHuawei hss9860 v900 r008c20 production description
Huawei hss9860 v900 r008c20 production descriptionRabih Kanaan,PMP
 
VoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallVoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallJose Gonzalez
 
20090408 11c9892102535c929b1bw mypajf_eub8l
20090408 11c9892102535c929b1bw mypajf_eub8l20090408 11c9892102535c929b1bw mypajf_eub8l
20090408 11c9892102535c929b1bw mypajf_eub8lVictor Etse
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session FlowKent Loh
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration FlowKent Loh
 
Ims call flow
Ims call flowIms call flow
Ims call flowMorg
 
Introduction to Evolved Packet Core Networks
Introduction to Evolved Packet Core NetworksIntroduction to Evolved Packet Core Networks
Introduction to Evolved Packet Core NetworksInam Khosa
 

En vedette (17)

Lte transport requirements
Lte transport requirementsLte transport requirements
Lte transport requirements
 
Lte optimization
Lte optimizationLte optimization
Lte optimization
 
5.oep100330 lte cell_planning_issue1.10
5.oep100330 lte cell_planning_issue1.105.oep100330 lte cell_planning_issue1.10
5.oep100330 lte cell_planning_issue1.10
 
Notes for scft
Notes for scftNotes for scft
Notes for scft
 
WiMAX & LTE Network Introduce For Swift
WiMAX & LTE Network Introduce For SwiftWiMAX & LTE Network Introduce For Swift
WiMAX & LTE Network Introduce For Swift
 
Chap05 gtp 03_kh
Chap05 gtp 03_khChap05 gtp 03_kh
Chap05 gtp 03_kh
 
LTE paging.ppt
LTE paging.pptLTE paging.ppt
LTE paging.ppt
 
Huawei hss9860 v900 r008c20 production description
Huawei hss9860 v900 r008c20 production descriptionHuawei hss9860 v900 r008c20 production description
Huawei hss9860 v900 r008c20 production description
 
Paging in LTE
Paging in LTEPaging in LTE
Paging in LTE
 
VoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallVoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice Call
 
20090408 11c9892102535c929b1bw mypajf_eub8l
20090408 11c9892102535c929b1bw mypajf_eub8l20090408 11c9892102535c929b1bw mypajf_eub8l
20090408 11c9892102535c929b1bw mypajf_eub8l
 
LTE Planning
LTE PlanningLTE Planning
LTE Planning
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session Flow
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration Flow
 
Ims call flow
Ims call flowIms call flow
Ims call flow
 
Introduction to Evolved Packet Core Networks
Introduction to Evolved Packet Core NetworksIntroduction to Evolved Packet Core Networks
Introduction to Evolved Packet Core Networks
 
LTE: X2 interface
LTE: X2 interfaceLTE: X2 interface
LTE: X2 interface
 

Similaire à 4 lte access transport network dimensioning issue 1.02

Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-Amir Mehdi Ahmadian
 
4G-Questions interview.pdf
4G-Questions interview.pdf4G-Questions interview.pdf
4G-Questions interview.pdfMohamedShabana37
 
152763323 lte-interview-question
152763323 lte-interview-question152763323 lte-interview-question
152763323 lte-interview-questionHassan Daud
 
Lte interview questions
Lte interview questionsLte interview questions
Lte interview questionsGangaprasadT
 
Paper lte-protocol-signaling
Paper lte-protocol-signalingPaper lte-protocol-signaling
Paper lte-protocol-signalingPetrona Frensel M
 
Scalability Problems of the mobile wireless networks
Scalability Problems of the mobile wireless networksScalability Problems of the mobile wireless networks
Scalability Problems of the mobile wireless networksQueen's University
 
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VWC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VSURESHA V
 
LTE Protocol Overview EMERSON EDUARDO RODRIGUES
LTE Protocol Overview EMERSON EDUARDO RODRIGUESLTE Protocol Overview EMERSON EDUARDO RODRIGUES
LTE Protocol Overview EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
18094043-LTE-Protocol-Overview.pdf
18094043-LTE-Protocol-Overview.pdf18094043-LTE-Protocol-Overview.pdf
18094043-LTE-Protocol-Overview.pdfMohamedShabana37
 
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels senthil krishnan
 
LTE_Basic_principle.pptx
LTE_Basic_principle.pptxLTE_Basic_principle.pptx
LTE_Basic_principle.pptxAbhilash C A
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionGuisun Han
 
Practical aspects of lte design and deployment
Practical aspects of lte design and deploymentPractical aspects of lte design and deployment
Practical aspects of lte design and deploymentDr. Ayman Elnashar, PhD
 

Similaire à 4 lte access transport network dimensioning issue 1.02 (20)

Lte questions adv
Lte questions advLte questions adv
Lte questions adv
 
Lte technology
Lte technologyLte technology
Lte technology
 
Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-
 
4G-Questions interview.pdf
4G-Questions interview.pdf4G-Questions interview.pdf
4G-Questions interview.pdf
 
4g interview-question
4g interview-question4g interview-question
4g interview-question
 
152763323 lte-interview-question
152763323 lte-interview-question152763323 lte-interview-question
152763323 lte-interview-question
 
Lte interview questions
Lte interview questionsLte interview questions
Lte interview questions
 
EVERYTHING IN LTE
EVERYTHING IN LTEEVERYTHING IN LTE
EVERYTHING IN LTE
 
Paper lte-protocol-signaling
Paper lte-protocol-signalingPaper lte-protocol-signaling
Paper lte-protocol-signaling
 
Digital network lecturer7
Digital network  lecturer7Digital network  lecturer7
Digital network lecturer7
 
Lte basic
Lte basicLte basic
Lte basic
 
J0343073079
J0343073079J0343073079
J0343073079
 
Scalability Problems of the mobile wireless networks
Scalability Problems of the mobile wireless networksScalability Problems of the mobile wireless networks
Scalability Problems of the mobile wireless networks
 
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VWC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
 
LTE Protocol Overview EMERSON EDUARDO RODRIGUES
LTE Protocol Overview EMERSON EDUARDO RODRIGUESLTE Protocol Overview EMERSON EDUARDO RODRIGUES
LTE Protocol Overview EMERSON EDUARDO RODRIGUES
 
18094043-LTE-Protocol-Overview.pdf
18094043-LTE-Protocol-Overview.pdf18094043-LTE-Protocol-Overview.pdf
18094043-LTE-Protocol-Overview.pdf
 
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
LTE Basic Guide _ Structure_Layers_Protocol stacks_LTE control channels
 
LTE_Basic_principle.pptx
LTE_Basic_principle.pptxLTE_Basic_principle.pptx
LTE_Basic_principle.pptx
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) Introduction
 
Practical aspects of lte design and deployment
Practical aspects of lte design and deploymentPractical aspects of lte design and deployment
Practical aspects of lte design and deployment
 

Dernier

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Dernier (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

4 lte access transport network dimensioning issue 1.02

  • 1.  1.01朱殿荣修订。根据郭宁反馈修订部分英文表述bug;将文中eNB全部更换为eNodeB; 修订文中部分图片不对其问题guo  1.02朱殿荣修订。郭宁:  p10,ip client 改为clock。  胶片中多处RLP,是否改为RLC?  另外,overhead这个词,名词解释有包头的意思吗?  是否应该是header。。。或者用overall header???? LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 2. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 3. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 4. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 5. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 6.  The eNodeB communicates with other NEs through the following five major interfaces:  The S1 interface exists between the eNodeB and the S-GW/MME. One eNodeB supports a maximum of 16 S1 interfaces.  The X2 interface exists between the eNodeBs. It mainly implements the X2 handover function. One eNodeB supports a maximum of 32 X2 interfaces.  The OM interface, also known as the OM channel, exists between the eNodeB and the network management system.  The clock interface, also known as the clock channel, exists between the eNodeB and the IP clock server. The eNodeB, functioning as the clock client, obtains the system clock from the clock packets that are periodically sent from the IP clock server.  The co-transmission interface, also called co-transmission channel, exists between the eNodeB and other devices. Traffic of other devices is forwarded through the IP routing function of the eNodeB. The other device can be a GSM/CDMA/WiMAX/UMTS/LTE base station or an IP-based device. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 7.  The S1 interface can be subdivided into the S1-MME interface supporting Control Plane signaling between the eNodeB and the MME and the S1-U Interface supporting User Plane traffic between the eNodeB and the S-GW.  S1 application protocol supports following functions  E-RAB Management - this incorporates the setting up, modifying and releasing of the E-RABs by the MME.  Initial Context Transfer - this is used to establish an S1UE context in the eNodeB, setup the default IP connectivity and transfer NAS related signaling.  UE Capability Information Indication - this is used to inform the MME of the UE Capability Information.  Mobility - this incorporates mobility features to support a change in eNodeB or change in RAT.  Paging  S1 Interface Management - this incorporates a number of sub functions dealing with resets, load balancing and system setup etc.  NAS Signaling Transport - this is used for the transport of NAS related signaling over the S1-MME Interface.  UE Context Modification and Release - this allows for the modification and release of the established UE Context in the eNodeB and MME respectively.  Location Reporting - this enables the MME to be made aware of the UEs current location within the network. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 8.  Defined by the IETF (Internet Engineering Task Force) rather than the 3GPP, SCTP was developed to overcome the shortfalls in TCP (Transmission Control Protocol) and UDP when transferring signaling information over an IP bearer. Functions provided by SCTP include:  Reliable delivery of higher layer payloads.  Sequential delivery of higher layer payloads.  Flow control.  GTP-U tunnels are used to carry encapsulated PDU (Protocol Data Unit) and signaling messages between endpoints. Numerous GTP-U tunnels may exist in order to differentiate between EPS bearer contexts and these are identified through a TEID (Tunnel Endpoint Identifier). LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 9.  X2 interface interconnects two eNodeBs and in so doing supports both a control plane and user plane. The principle control plane protocol is X2AP . This resides on SCTP where as the User Plane IP is transferred using the services of GTP-U and UDP .  The function of X2 AP is shown as following:  Mobility Management - this enables the serving eNodeB to move the responsibility of a specified UE to a target eNodeB. This includes Forwarding the User Plane, Status Transfer and UE Context Release functions.  Load Management - this function enables eNodeBs to communicate with each other in order to report resource status, overload indications and current traffic loading.  Error Reporting - this allows for the reporting of general error situations for which specific error reporting mechanism have not been defined.  Setting / Resetting X2 - this provides a means by which the X2 interface can be setup / reset by exchanging the necessary information between the eNodeBs.  Configuration Update - this allows the updating of application level data which is needed for two eNodeBs to interoperate over the X2 interface.  For the SCTP and GTP, it performs the similar functions as it performs in S1 interface. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 10. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 11.  IEEE1588 defines the PTP protocol, which applies to the standard Ethernet, with the precision to microseconds.IEEE1588 V2 released in 2008 mainly incorporates the improvements on higher frequency accuracy and less impact of the processing delay at the intermediate transport equipment.  The IEEE1588 standard targets precise synchronization of distributed and independent clocks in measurement and control systems. In LTE applications, high-accuracy frequency synchronization and time synchronization between clock servers and eNodeBs can be achieved. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 12.  When layer 1 network is adopted as the transport bearer network, the eNodeB and adjacent NEs are connected through the physical layer. The Synchronous Digital Hierarchy (SDH) network and Plesiochronous Digital Hierarchy (PDH) network are typical layer 1 networks. The eNodeB supports the access to the SDH/PDH network through the E1/T1 interface. The direct connection through the Ethernet interface, for example, the connection of the eNodeB and the S-GW through the GE optical cable is a layer 1 network. The following describes only the E1/T1 connection mode, because the direct connection mode is rare in the actual situations.  As shown above, the layer 1 network provides only the bearer function on the physical layer, which is the simplest transport bearer mode. In this mode, the transmission to the upper layers is transparent. When using a layer 1 networking solution, users need to configure the related data concerning the physical layer, such as the attributes of the E1/T1 interface.  The cost of renting the transport devices is usually high. In the case of the layer 1 network, the channels are allocated in fixed mode. Therefore, the bandwidth utilization is low. Besides, the bandwidth needs to be configured for each S1/X2 logical interface.  The layer 1 transport bearer network is usually applied to the GSM/UMTS system that provides mainly the CS service. It is rarely applied to the LTE system that provides mainly the PS service. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 13.  The layer 2 network is usually adopted as the transport bearer network of the LTE system. The layer 2 network in the LTE system is the Ethernet switching network. The major device is the Ethernet switch. The eNodeB accesses the Ethernet switching network through the FE/GE interface.  As shown above, the layer 2 network provides the bearer function on the MAC layer. The MAC layer is the data link layer protocol of the Ethernet. Complying with the IEEE 802.3, the MAC layer provides addressing and data access control mechanisms. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 14.  The layer 3 network in the LTE system is the IP routing network. The major device is the router. The eNodeB accesses the IP routing network through the FE/GE interface or the E1/T1 interface.  As shown above, the layer 3 network provides the bearer function on the IP layer. Users need to configure the physical layer, data link layer, and IP layer.  The configuration of the physical layer and data link layer involves the configuration of the E1/T1 interface and FE/GE interface.  The configuration of the IP layer involves the configuration of the IP addresses, IP route list, and DiffServ.  The layer 3 network is usually adopted as the transport bearer network of the LTE system. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 15. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 16. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 17. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 18. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 19.  MAC provides the interface between the E-UTRA protocols and the E-UTRA Physical Layer. In doing this it provides the following services:  Mapping - MAC maps the information received on the LTE Logical Channels into the LTE transport channels.  Multiplexing - The information provided to MAC will come from a RB (Radio Bearer) or multiple Radio Bearers. The MAC layer is able to multiplex different bearers into the same TB (Transport Block), thus increasing efficiency.  HARQ (Hybrid Automatic Repeat Request) - MAC utilizes HARQ to provide error correction services across the air. HARQ is a feature which requires the MAC and Physical Layers to work closely together.  Radio Resource Allocation - QoS (Quality of Service) based scheduling of traffic and signaling to users is provided by MAC. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 20.  The RLC protocol exists in the UE and the eNodeB. As its name suggests it provides “radio link” control, if required. In essence, RLC supports three delivery services to the higher layers:  TM (Transparent Mode) - This is utilized for some of the air interface channels, e.g. broadcast and paging. It provides a connectionless service for signaling.  UM (Unacknowledged Mode) - This is like Transparent Mode, in that it is a connectionless service; however it has the additional features of sequencing, segmentation and concatenation.  AM (Acknowledged Mode) - This offers an ARQ (Automatic Repeat Request) service. As such, retransmissions can be used. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 21.  PDCP (Packet Data Convergence Protocol) provides services to both the Control Plane and User Plane. The main PDCP functions include:  Header compression and decompression of IP datagrams using the ROHC (Robust Header Compression) protocol.  Maintenance of PDCP SN (Sequence Number) for radio bearers operating in RLC AM (Acknowledged Mode).  In-sequence delivery of upper layer PDU (Protocol Data Units) at handover.  Duplicate elimination of lower layer SDUs at handover for RLC AM radio bearers.  Ciphering and deciphering of User and Control Plane data.  Integrity protection and integrity verification of the Control Plane data.  Discarding of data on a timeout basis.  Discarding of data on a duplicate basis. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 22.  In radio systems, the resources on the LTE-Uu interface are far more precious than the processing capability of processors. Therefore, ROHC is suitable for radio systems, even though it is complex compared with earlier schemes. It is mainly used for VoIP services.  In LTE, the ROHC entity is located within the Packet Data Convergence Protocol (PDCP) entity on the user planes of the UE and the eNodeB, and is used only for the header compression and decompression of data packets on the user plane. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 23. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 24.  GTP-U tunnels are used to carry encapsulated PDU (Protocol Data Unit) between endpoints or in the case of the X2 interface.  Numerous GTP-U tunnels may exist in order to differentiate between EPS bearer contexts and these are identified through a TEID (Tunnel Endpoint Identifier).  The average header for GTP-U is 12 bytes, consist of following part  Version: Specify the GTP protocol version  P flag: Indicate whether another GTPv2-C message with its own header and body shall be present at the end of the current message  T flag: Indicate the presence or not of the TEID field.  Message Type: Indicate the type of GTP message.  TEID: Indicate the unique GTP channel. It is unique per EPS bearer for GTP-U and per PDN connection for GTP-C.  Sequence Number: Allows in-order delivery of user plane PDU. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 25. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 26. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 27.  Access control based on IEEE 802.1x ensure the authorized accesses of the eNodeB to the transport network. For details, see section ‎5.2 "Access Control Based on IEEE 802.1x." To adapt to the all-IP based transmission mode of the LTE system, the eNodeB uses the IPSec security mechanism to ensure the confidentiality, integrity, and availability of data transmission. IPSec services are the security services provided for the IP layer, and thus can be used by the upper-layer protocols such as the TCP, UDP, ICMP, and SCTP. IPSec is a protocol family used to guarantee the security for IP communication.  For transmission of IP packets, IPSec guarantees high-quality and interoperable security based on cryptology. Ciphering and integrity verification are performed on the IP layer between specific communicating parties to guarantee the following security features of packet transmission:  Data confidentiality: Ciphering protection is performed on user data, which is transmitted in ciphered text.  Data integrity: The received data is authenticated to check whether or not the data is modified.  Authentication: The data source is authenticated to guarantee that data is transmitted from an authenticated sender.  Replay protection: The attack by unauthorized users, who repeatedly transmit the captured packets, is prevented. The party under the attack does not accept the old or repeated packets. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 28.  IPSec supports two security protocols: the Authentication Header (AH) protocol and Encapsulation Security Protocol (ESP) protocol. The AH protocol performs integrity protection, and the ESP protocol performs both integrity protection and ciphering.  IPSec supports two packet encapsulation modes: transport mode and tunnel mode. The difference between the transport mode and the tunnel mode is the IP packet protection scope.  Transport mode: protects the effective payload and upper-layer protocols (ULPs) of IP packets. In transport mode, the IPSec headers (AH or ESP) are placed behind the IP header and before the ULPs.  Tunnel mode: protects the security for original IP packets. In tunnel mode, the original IP packet is encapsulated into a new IP packet, and the IPSec header is inserted between the headers (AH and/or ESP) of the new and original IP packets. The header of the original IP packet is protected as part of the effective payload. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 29.  Virtual Local Area Network (VLAN) is a data exchange technology derived from the traditional LAN.  VLAN allows LAN devices to be logically grouped into multiple network segments (that is, smaller LANs) to implement virtual workgroups. The hosts in different VLANs are separated from each other and they communicate with each other only through routers. A VLAN is a broadcast domain, that is, a host in a VLAN can receive the broadcast packets from the other hosts in the same VLAN but cannot receive the broadcast packets from other VLANs. The VLAN attaches different labels to the operation, administration, and maintenance (OAM) data and the traffic data. Thus, differentiated services can be provided. The VLAN also provides services of different priorities and security levels on the MAC layer.  The VLAN header consists of following parts:  TPID: Tag protocol identifier, indicate that it is the frame with 802.1Q, the value is fixed with 0x8100, the length is 2 bytes  PRI: Priority indicator, 3 bits  CFI: Canonical Format Indicator, 1 bit  VLAN ID: Indicate which VLAN belongs to, 12 bits LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 30. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 31. LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 32.  From the capacity dimensioning, we can get throughput of radio interface, including the overhead of radio interface. So the radio payload throughput can be calculated. During the IP transport, the additional overhead will be added, from the analysis of overhead, we can get the throughput of transport layer. LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 33.  PDCP: Packet Data Convergence Protocol, perform data integrity check and ciphering function.  ROHC: Robust of head compression, it is a kind of head compression technology  RLC: Radio link control protocol  MAC: Perform scheduling control function  CRC: Cyclic redundancy check LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 34. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 35. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 36. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 37. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 38.  The LMPT provides four Ethernet interfaces, that is, two optical interfaces (SFP, 100/1000BASE-FX) and two electrical interfaces (RJ45, 10/100/1000BASE-TX). Two interfaces can be used in combined mode. Multi-mode optical cable or single-mode optical cable can be used according to the type of the optical module. LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 39. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 40. Course Name Confidential Information of Huawei. No Spreading Without Permission N-39
  • 41. LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission