Beruflich Dokumente
Kultur Dokumente
1. LTE Architecture
2. LTE Attach procedure & call flow-
3. Carrier Aggregation-
4. Handover in LTE
5. QOS(Quality of services)
6. QCI (QoS Class Identifier)
7. ARP (Allocation and Retention Priority):
8. GBR (guaranteed bit rate)
9. NON-GBR:
10. MBR (UL/DL):
11. TAU(Tracking area update):
12. RACH-
13. IMS call flow or SIP sequence
14. What is Cell Reselection?
15. What is CSFB [Circuit Switch FallBack]?
16. What is SRVCC [ Single Radio Voice Call Continuity]?
17. Entities of IMS Architecture
18. Explain IMS Registration Process
19. Explain RRC states
20. Explain RACH procedure
21. Explain Session Initiation Protocol
22. SIP MESSAGES
23. Explain the purpose of IPSec
24. Powers in LTE
25. What is MRF?
26. Is Antenna a Passive or Active Element and why?
27. What are the parameters to be monitored for Throughput?
28. Explain Channel Grid (Mapping) in Detail?
29. What is CDRX?
30. Explain functionality of different channels in LTE?
31. Modulation Scheme Supported for Uplink and Downlink?
32. What is Integrity Key / Ciphering Key?
33. What is use of NV Browser in QXDM?
34. Describe LTE power on procedure.
35. What MIB contain
36. what SIB1&2 contain
37. what is contention resolution
38. describe attach procedure
39. describe IMS registration procedure
40. . Physical Channels in LTE?
41. QoS
42. Bearer
43. . LTE Security?
44. . Functions of RLC?
45. . What are the Modes of RLC?
46. SIP protocols in LTE?
47. What are the Functions of RRC?
48. Explain ARQ & HARQ.
49. Reference signals in LTE?
50. PLMN selection procedure.
51. HPLMN or the highest priority EHPLMN
52. Difference between dB and dBm
53. What is PSS & SSS.?
54. Explain different HANDOVER events like A1, A2, A3, A4, A5 & B1, B2.
55. What are different types of Rach in LTE?
56. When TAU is initiated and types of TAU
57. In 2g and 3g architecture which entity handles packet request
58. Which technology is better LTE or CDMA?
59. Which are the basic entities in LTE?
60. Draw resource block in frequency and time domain and explain
61. What is SRB and DRB? Explain their functions.
62. How many SRB are there in LTE and WCDMA?
63. Draw IMS architecture.
64. Channels in LTE.
65. What is difference between LTE and LTE -advance technology?
66. Rach procedure with all IES
1. LTE Architecture-An LTE network consists of LTE entities (UE and eNB) and EPC
entities (S-GW, P-GW, MME, HSS, PCRF, SPR, OCS and OFCS). A PDN is an
internal or external IP domain of the operator that a UE wants to communicate
with, and provides the UE with services such as the Internet or IP Multimedia
Subsystem (IMS)
LTE entities-
EPC entities-
LTE interfaces-
* Difference between LTE, UMTS & GSM:
1 For Data services For packet switched (PS) For packet switched (PS)
EPC(MME+ SGW+ PGW+ operations SGSN and GGSN will operations SGSN and
HSS) will be used. serve the purpose GGSN will serve the
purpose
2. For voice services either For Circuit switched (CS) For Circuit switched (CS)
CSFB or VoLTE will be used. operations MSC and GMSC along operations MSC along
with database modules such as with database modules
VLR, HLR will be available such as VLR, HLR will be
available
4. Frame duration is 10ms Frame duration is about 10ms Frame duration is about
4.615ms
a. Initial acquisition- Frequency acquisition & cell acquisition process happens during Initial
acquisition. Initial acquisition message also contains PBCH decoding result.
During frequency acquisition it scans all the supported bands & their frequencies & selects
one of them.
For cell acquisition it decodes PSS(primary synchronization signal) & SSS(secondary
synchronization signal) and based on their values it calculates PCI(physical cell Identity)
PCI= 3*SSS + PSS where PSS =Cell number(0-2) & SSS= Cell group ID(0-167)
c. SIB(system information block) 1- SIB 1 contains PLMN, tracking area code, cell barring
information & scheduling information of other SIBs.
PLMN(Public land mobile network)= MCC(mobile country code of three digit) +
MNC(Mobile Network code of either 2 or 3 digit).
Barred cell
Barred cell is a cell on which a UE is not allowed to camp on. A cell is barred if it is so
indicated in the system information.
Reserved cell
Reserved cell is a cell on which camping is not allowed for all UEs, except for particular
UEs, if so indicated in the system information.
If the cell is barred UE can’t camp on that cell.
If the cell is not barred & not reserved for operator use then UE can camp on that cell
easily.
If the cell is not barred & reserved for operator use then, only those UE belonging to
access class identifier 11 & 15 can camp on that cell.
e. Attach request- Attach request is a NAS message which triggers RRC connection request.
It has GUTI, Attach type, tracking area ID & PDN connectivity request.
f. RRC connection request- It’s an RRC message which contains RRC connection
establishment cause.
g. RACH-
There are four messages which comes under RACH process
MSG1(LTE random access request)- It contains Information like PRACH power, RA-RNTI,
Duplex mode etc.
MSG2(LTE random access response)- It has Important parameters such as Timing
advance(TA) & RACH procedure type.
MSG3(LTE UE identification message)- This message carries modulation type & TPC.
i. RRC connection setup complete- This message contains MME id of registered MME.
mmegi(MME group id)- Used to select MME group from an MME pool.
mmec(MME code)- Used to select particular MME from an MME group.
j. SIB3- This message has intra-frequency cell reselection info. The parameters in this
message will be used as a condition for reselection.
p. ESM information request- It’s a NAS EMM message generated from Network which asks
UE for selected access point name(APN).
t. Security mode command(RRC)- This message contains RRC level security mode
command.
u. Security mode complete(RRC)- This message has response to the security mode
command message.
v. RRC configuration reconfiguration- This message is for reconfiguration of user plane(RLC,
PDCP, MAC, Physical) layers, Radio bearers & reference signal.
w. RRC connection reconfiguration complete- This message contains response to RRC
reconfiguration complete.
x. Attach accept- It contains a lot of information like:
Attach Type:
TAU timer:
QCI value:
PDN address:
4. Handover in LTE: When an UE moves from one cell to other cell or signal strength of serving
cell is less than the neighboring cell LTE performs handover, similarly there are few more
conditions for handover. LTE doesn’t support soft handover, it supports only hard handover.
* Difference between handover, cell selection, cell reselection & redirection.
-> Handover occurs when UE is in RRC connected mode & remains in connected mode after
handover.
-> Cell selection: It happens during initial acquisition process using SSS & PSS.
-> Cell reselection: It happens when an UE is in RRC idle mode & moves in a coverage area of poor
signal strength. The RRC after cell reselection is in idle state.
-> Cell redirection: When UE changes its RAT, cell redirection happens. In redirection UE goes
from connected state to idle state.
IMS register request: UE sends SIP register message with nonce & cnonce value
IMS register response(Authorized): Network sends register response with response code 200.
Subscribe response: Network sends subscribe response with Record-route & routing ID:
Notify: UE sends notify request with Subscription state:
Notify response:
Invite: In invite message UE sends IP address, mode change capability & RTP map information.
Session progress: This message is also a response to the invite message, It contains Server
information.
SIP acknowledgement:
IMS VoLTE session setup: It contains information like- Direction of call (MO/MT),
originating/Terminating URI & result of session setup.
IMS VoLTE session end: This message contains VoLTE session end cause:
In following condition, UE should detect for both lower and higher priority LTE
frequencies.
Srxlev <= s-PrioritySearch1 (SIB 19 of WCDMA)
Squal <= s-PrioritySearch2 (SIB 19 of WCDMA)
* When the CSFB UE is turned on, it registers itself in the two networks: LTE and legacy network
(CS).
And to allow quick transfer to the legacy network (either 2G or 3G) when necessary, the LTE
network needs to know the location of the UE.
For this, the MME, which tracks the location of the UE in the LTE network, continuously provides
location information to the legacy MSC, using the new SGs interface.
* When a UE or mobile phone starts a voice call the network move the UE to a legacy UMTS (3G)
or GSM (2G) network. The UE use the legacy network to initiate the call and complete the call.
After the call is over UE again move back to the LTE network.
* When in legacy network (3G/2G) the UE can have PS data sessions. PS data is supported in 2G
network only when DTM (Dual Transfer Mode) is supported. When UE supports DTM it can have
both voice and data simultaneously.
*The network must support the SGs(between MSC & MME) interface to support CS Fallback.
Initially UE is registered on EUTRAN network and is idle state. This is the precondition.
When UE starts the call it goes from idle to active state. The eNodeB now redirect the UE to a
legacy network.
This is done through the RRC Connection Release message. This message contains the IE
“REDIRECTED CARRIER INFO” It also has the details about the target UARFCN(WCDMA)
or ARFCN(GSM).
When UE receives this message it tune into the target network. Let’s consider the target network
is UTRAN.
In the target network the UE reads the MIB (Master Information Block) and other required
System Information Blocks
The next step is to start the RRC connection procedure to initiate the voice call in UTRAN
network.
LTE MT CS Fallback Call Flow
In case of MT call, our UE is registered and is in LTE network. It receives a “CS SERVICE
NOTIFICATION” EPS mobility management message for an incoming call. The LTE network
will redirect the UE to UMTS network to complete the call.
CS Service Notification message: This message is sent by the network when a paging request
with CS call indicator was received via SGs for a UE, and a NAS signaling connection is already
established for the UE.
After receiving this message, the UE prepares itself for CSFB procedure. It starts the timer T3417.
The network then sends the RRC Connection Release message with “redirected carrier info”.
The UE does a IRAT Redirection. After moving to WCDMA it reads the MIB and necessary SIBs.
Then it triggers the RRC Connection Request with cause “terminating conversational call”.
* If you have active data connection while performing CSFB then there are two options:
The upper layers forcing the 'reselection' to LTE so that the UE enters idle mode in legacy
network.
The operator send LTE 'redirection' information in RRC connection release message of
legacy 3G network after the call is finished. This will result again in reselection to LTE.
The lower layers reselect to LTE if the reselection criterion is satisfied. In most cases,
operators have their parameters set such that the reselection to LTE happen if there is a
good LTE coverage area overlapping the legacy network.
And specifically in case of "MO CSFB" call the UE performs Tracking Area Update as
soon as it returns to LTE network.
16. What is SRVCC[ Single Radio Voice Call Continuity]?
Ans) The SRVCC is a handover process of a voice call previously started in the LTE (VoLTE
call) to the legacy network for call continuity.
It is a call transfer method (handover), when an LTE user has an active voice session in IMS
and is moving to areas without LTE coverage, but with legacy 2G/3G coverage.
The main advantage is that the call will not drop and will only be transferred to the CS domain
of the legacy networks.
If in the above case the UE moves out of LTE coverage area with an active call (but goes to a
legacy 2G/3G coverage), the continuity of this active voice call must be maintained. In this case,
the SRVCC is used, the procedure where the context of an active voice call on the IMS is
transferred to the CS legacy network.
If the SRVCC is not supported, the call is dropped as soon as it leaves the LTE coverage area.
If the SRVCC is supported, a set of messages are exchanged, and the voice call is transferred
(handover) from LTE IMS to CS domain
To allow SRVCC both the UE and LTE networks, as also the legacy, must support SRVCC. For
this, a new special SV interface is introduced between the MME and the MSC, which runs on
GTPv2 protocol.
To support SRVCC, the IMS network should also include an application server, called SCC AS
(Server Centralization and Continuity Application Server).
This application server manages the signaling required for the SRVCC process.
SRVCC Procedure:
*Realizing that its LTE signal level begins to decrease, the UE with an active IMS voice session
signals it to the eNodeB, initiating the SRVCC handover.
*The eNodeB then identifies the best available network to receive the service, and sends the
handover request (specifying that it is the SRVCC type) to the MME.
*The new voice call request is then sent to the IMS, using a SR STN (Session Transfer Number
for SRVCC) - a unique number that is generated by each UE, and is stored in HSS.
*This unique number is sent by the MME to the HSS when the UE firts comes into contact with
the network.
*Upon receiving the STN SR number, the SCC AS believes that the corresponding call should be
transferred to a different network network, and starts the redirecting process for the transfer point
(handover) to the legacy network.
*After resource preparation is completed, the MME confirms the handover request, previously
provided by the eNodeB.
*The eNodeB then transmits this acknowledgment to the UE, while still providing the required
information about the target network.
*In the final stages, the UE is detected in legacy networks, and the call is re-established in it.
*Voice packets and also packets that are not voice can be transferred using this method, but the
data rates will be limited by the capabilities of the legacy networks.
* The P-CSCF is the user to network proxy. In this respect all SIP signalling to and
from the user runs via the P-CSCF whether in the home or a visited network.
*When any user registers with the IMS network, the registration signalling will pass
through the P-CSCF.
*The P-CSCF may support Policy Enforcement capabilities for authorizing media plane
resources, bandwidth, and QoS management.
*In addition, the P-CSCF can also generate charging information to be collected by
charging network nodes.
* The I-CSCF is a SIP proxy located in the edge of an administrative IMS domain. Its IP
address is published in the Domain Name System (DNS) of the domain so that remote
servers can find and use it as a forwarding point (e.g., registering) for SIP packets to this
IMS domain.
*The I-CSCF implements a Diameter interface to the HSS (Home Subscriber Server), and
queries the HSS to retrieve the address of the S-CSCF for an UE to perform SIP
registration.
* Being a SIP proxy, the I-CSCF forwards SIP message requests and responses to the S-
CSCF. Additionally, the I-CSCF may encrypt parts of the SIP messages securing any
sensitive information.
*Typically the IMS network includes a number of I-CSCF nodes for the purpose of
scalability and redundancy. The I-CSCF is usually located in the IMS home network.
* The S-CSCF is a central function of the signalling plane in the IMS core network.
*A S-CSCF node acts as a SIP registrar, and in some cases as a SIP redirect server. It is
responsible for processing the location registration of each UE, user authentication and call
routing and processing.
*Similar to the I-CSCF, the S-CSCF supports Diameter Cx and Dx interfaces to the HSS
to download the authentication information and user profile of the registering UEs from
the HSS for authentication purpose.
*All of the SIP signalling from/to the IMS UEs traverses their serving S-CSCF allocated
during the registration process.
*The S-CSCF also provides SIP message routing and services triggering. It also enforces
the policy of the network operator and keep users from performing unauthorized
operations.
* The IMS HSS or home subscriber server is the main subscriber database used
within IMS.
*The IMS HSS provides details of the subscribers to the other entities within the
IMS network, enabling users to be granted access or not dependent upon their
status.
*When a subscriber registers onto an IMS network, the subscription data is
retrieved from the HSS by the Serving-CSCF, S-CSCF that has been assigned to
the subscriber.
Charging subscription data is sent from the HSS to the P-CSCF via the S-CSCF.
*IMS public user identity data which is also kept in the S-CSCF is forwarded to the
user equipment
*Service subscription data is forwarded from the HSS to the SIP-AS via the S-
CSCF. This enables charging for the services to be managed.
6) Breakout gateway control function, BGCF: This entity within the IMS architecture
selects the network in which a PSTN breakout is to occur. If this is to occur in the same
network as the BGCF, then the BGCF selects a media gateway control function, MGCF
7)Media gateway control function, MGCF: This entity interworks the SIP signalling.
It manages the distribution of sessions across multiple media gateways.
8)Media server function control, MSCF: This manages the use of resources on media
servers.
Ans) The first place all IMS message go through is P- CSCF. Roughly there are several different
ways of finding (discovering) P-CSCF as listed below.
PCO (Protocol Configuration Option) in Activate default EPS bearer context request
DHCP process.
UE provisioning (Configuration Files or variables stored in UE)
UICC(USIM/ISIM)
If the IMS is serviced via a mobile network (e.g, LTE), it would be more likely for a UA to find
P-CSCF IP address via PCO or some predefined configuration in UE.
* The subscriber sends a “REGISTER” message to inform the network that the specified user
public identify is available at the IP address indicated in the Contact Header. The User Equipment
(UE) also adds a via header to record that the message had traversed the UE. The “REGISTER”
message also includes the server and client ports. The message itself is sent on the standard SIP
port 5060. The SIP “REGISTER” message also includes the private identity of the user. This identity
will be used by the S-CSCF and HSS to identify the user.
* The P-CSCF receives the “REGISTER” message and uses the DNS to translate from the domain
name to the IP address of the home network.(IP address of the I-CSCF)
* The “REGISTER” message will be routed to the IP address of the I-CSCF obtained from the DNS
response. Now the integrity protection flag is set to false to signify that the user has not been
authenticated.
*The I-CSCF queries the HSS using "User Authorization Request" message to assign this user a
S-CSCF by providing the user's private identity present in the “REGISTER” message . The HSS
replies with the S-CSCF name and S-CSCF capabilities in "User Authorization Answer" message.
* I-CSCF selects the S-CSCF based on the S-CSCF capabilities. The I-CSCF forwards the “REGISTER”
message to the selected S-CSCF.
*The selected S-CSCF sends user's private identity in "Media Authentication Request " message
to the HSS , to which the HSS replies with the Random number (RAND), Authentication token
(AUT), signed result (XRES), Cipher key (CK) and Integrity Key (IK) in "Media Authentication
Answer" message.
* The S-CSCF slects and saves the selected authentication vectors.
* The user is currently not authenticated, so the registration request is rejected. The terminal is
challenged to authenticate the user. RAND, AUTN, CK and IK are passed in the WWW-
Authenticate header in the “401 UNAUTHORIZED” message by S-CSCF to I-CSCF.
* The I-CSCF Passes the “401 UNAUTHORIZED” message to the P-CSCF. CK and IK are also carried
along.
* The P-CSCF saves the ciphering and integrity keys. These keys will be needed for establishing
the IPSec security association. The P-CSCF allocates the subscriber side client and server ports.
These ports will be included in the “401 UNAUTHORIZED” message sent to the Subscriber.
* P-CSCF passes the RAND and AUTN values to the subscriber. The CK and IK are removed from
the WWW-Authenticate header. The P-CSCF side client and server ports are also included in the
message. The message itself is sent on the standard SIP port 5060.
*The subscriber Authenticate the IMS network by verifying the authentication token (AUTN). Also
compute the RES value that will be passed back to the IMS network for user authentication
*Now the IPSec SA is being established between the UE and P-CSCF for all the client and server
ports of UE and P-CSCF.
* The Subscriber has now established the IPSec security associations with the P-CSCF. At this
point, the SIP “REGISTER” message is sent again. This time the message is protected by IPSec and
the message is addressed to the P-CSCF server port passed in the “401 UNAUTHORIZED”
message. The message contains the RES in the Authorization header.
*The P-CSCF Pass the “REGISTER” message to the I-CSCF. This time the Authorization header
indicates that integrity protection is enabled.
*The I-CSCF queries the HSS in "User Authorization Request" to assign this user a S-CSCF using
the user's private identity and the HSS in response replies with the S-CSCF names and capabilities
in the "User Authorization Answer" message.
*The I-CSCF selects the S-CSCF based on its capabilities and then finally the integrity protected
“REGISTER” message is sent to the S-CSCF.
*Upon receiving the “REGISTER” message the S-CSCF queries the HSS to provide all the
subscriber related information in "Server Assignmet Request" and it receives all the subscriber
related information in "Server Assignment Answer" message.
*The S-CSCF now compares the "RES" reported in “REGISTER” message by UE with the "XRES"
received during "Media Authorizaton Answer" message from HSS.
*If matched the S-CSCF replies back with success in "200 OK" message.
*This success "200 OK" message is relayed back to the UE via I-CSCF and P-CSCF. And finally the
registration of the UE in IMS is achieved.
Q) What are the diiferent headers used in Registration Procedure?
Ans) f( From) :- ID of the initiator of the REGISTER message.
tag:- Used for identification , if multiple requests are originated by the same UE.
Cseq( Command Sequence):- Consists of Sequence number and a method.It is
initialized at the start of the call and incremented for each new request except for
“CANCEL” and “ ACK” requests.
Call Id(i):- Unique identifier to identify messages belonging to that call.All messages
within this session will have the same Call-Id.
via(v):- Records the route taken by the Request, so the originator can be reached for
RESPONSES to this request.
contact (m):- IP address ,port,and unique device identifier where the UE can be reached
for further REQUESTS.
{**via header tells other elements where to send the RESPONSE, whereas the contact
header tells other elements where to send the further REQUESTS..**So if a party sends
RESPONSE to a REQUEST it sends it to the via header’s address but if a party sends a
REQUEST it will send it to contact header’s address.}
Max-Forwards:- Limits the number of hops a request can transit on the way to its
destination and is decremented by 1 at each hop.
Route:- It indicates the IP address of the next hop or next destination where the
REQUEST message will be forwarded.
Content-Length(l):- Size of the message body in bytes. This field is set to zero ‘0’ for
REGISTER message as it only contains headers.
Expires:- Indicates the duration where the REQUEST remains valid in seconds. If Expire
header is not present, the REGISTER message expires in 3600 seconds( default).
Ans) *There are 2 RRC states defined for the UE. When a UE is powered ON it will be in the
RRC IDLE state until the RRC connection is established.
*RRC_CONNECTED:
The radio is active and UE is known to both EPC and eNB.
Mobility is controlled by Network.
Major procedures defined in CONNECTED mode:
Control Plane
eNB context and RRC connection
Network can transmit and/or receive data to/from UE
Neighbor cell measurement
User Plane
UE can transmit and/or receive data to/from network
Monitors control signaling channel
Reports CQI and feedback information to eNB.
Connected Mode DRX
20. Explain RACH procedure?
Ans) Random Access Procedure: In order to be synchronized with the network, RACH
procedure is used.
Suppose a UE wants to access the network, so first it will try to attach or synchronize with the
network. In LTE a separate channel PRACH ( Physical Random Access Channel) is provided for
initial access to the network.
To initiate the procedure UE lower layes will send a Random Access Request(RACH Request)
after receiving request from UE RRC.
1.PRACH Config Index - There is a mapping from which UE can find the available sub frames
where it can send a RACH.
2.PRACH Frequency Offset - This value is also received in SIB2 by UE. It governs which
frequency resource UE can use for the RACH Req.
Example: If the value of PRACH Freq Offset is 10. UE can use the 6 PRB's starting from PRB
10 for RACH Request.
1.Preamble Index :- There are total of 64 preambles available which are divided into two
groups Group A and Group B. UE decides the preamble index from a group on the basis of
parameters received in SIB2:-
numberofRaPreambles :- eNodeB sends this value in SIB2 which denotes the total number of
preambles available for UE to send a Rach Request.
MessageSizeGroupA: - It is used for selecting a preamble from a group. Its value is in bits.
Now UE needs to decide the group from which it needs the preamble. Group is decided on the
basis of size of MSG 3(RRC connection request).
2.powerRampingStep:- This is mainly used when eNodeB is not able to detect the Rach
Request then UE will re transmit the RACH Request by increasing the power
to powerRampingStep factor.
UE will send the RACH Request containing these values in the specified subframe by using the
specified resources.
2. Timing Advance: - After receiving RACH Request, eNodeB PHY (Physical layer)
calculates the timing advance which is transmitted to the UE as part of response
message.
3. Allocate uplink Resources (UL GRANT):- eNodeB will provide the required
information in Random Access Response (RAR) message for UE to send the MSG3(
RRC Connection Request) .
SIP is rather a component that can be used with other IETF protocols to
build a complete multimedia architecture. Typically, these architectures will
include protocols such as the Real-time Transport Protocol (RTP)for transporting
real-time data and providing QoS feedback, the Real-Time streaming protocol
(RTSP)for controlling delivery of streaming media, the Media Gateway Control
Protocol (MEGACO)for controlling gateways to the Public Switched Telephone
Network (PSTN), and the Session Description Protocol (SDP)for describing
multimedia sessions. Therefore, SIP should be used in conjunction with other
protocols in order to provide complete services to the users.
Bob decides to answer the call. When he picks up the handset, his SIP phone sends a 200 (OK)
response to indicate that the call has been answered. The 200 (OK) contains a message body with
the SDP media description of the type of session that Bob is willing to establish with Alice.
Finally, Alice's softphone sends an acknowledgement message, ACK, to Bob's SIP phone to
confirm the reception of the final response (200 (OK)).
This completes the INVITE/200/ACK three-way handshake used to establish
SIP sessions.
Alice and Bob's media session has now begun, and they send media packets
using the format to which they agreed in the exchange of SDP. In general, the
end-to-end media packets take a different path from the SIP signalling messages.
During the session, either Alice or Bob may decide to change the
characteristics of the media session. This is accomplished by sending a re-
INVITE containing a new media description. This re-INVITE references the
existing dialog so that the other party knows that it is to modify an existing
session instead of establishing a new session. The other party sends a 200 (OK)
to accept the change.
The requestor responds to the 200 (OK) with an ACK. If the other party does
not accept the change, he sends an error response such as 488 (Not Acceptable
Here), which also receives an ACK. However, the failure of the re-INVITE
does not cause the existing call to fail , the session continues using the
previously negotiated characteristics.
If Bob did not wish to answer the call or was busy on
another call, an error response would have been sent instead of the
200 (OK), which would have resulted in no media session being
established.
At the end of the call, Bob disconnects (hangs up) first and
generates a BYE message. This BYE is routed directly to Alice's
softphone, again bypassing the proxies. Alice confirms receipt of
the BYE with a 200 (OK) response, which terminates the session and
the BYE transaction. No ACK is sent
Both Request and Response messages use the basic format of , even though the syntax differs
in character set and syntax specifics.
Both types of messages consist of a start-line, one or more header fields, an
empty line indicating the end of the header fields, and an optional message-body.
generic-message = start-line
*message-header
CRLF
[ message-body ]
start-line = Request-Line / Status-Line
The start-line, each message-header line, and the empty line MUST be terminated by a carriage-
return line-feed sequence (CRLF). Note that the empty line MUST be present even if the message-
body is not.
REQUESTS
SIP requests are distinguished by having a Request-Line for a start-line. A Request-Line
contains a method name, a Request-URI, and the protocol version separated by a single space “SP”
character.
Request-Line = Method SP Request-URI SP SIP-Version CRLF
SIP elements MAY support Request-URIs with schemes other than "sip" and
"sips", for example the "tel" URI.SIP elements MAY translate non-SIP URIs
using any mechanism at their disposal, resulting in SIP URI, SIPS URI.
RESPONSES
SIP responses are distinguished from requests by having a Status-Line
as their start-line.
A Status-Line consists of the protocol version followed by a numeric Status-
Code and its associated textual phrase, with each element separated by a single
“SP” character.
Status-Line = SIP-Version SP Status-Code SP Reason-Phrase CRLF
The Status-Code is a 3-digit integer result code that indicates the outcome of an
attempt to understand and satisfy a request. The Reason-Phrase is intended to
give a short textual description of the Status-Code. The Status-Code is intended
for use by automata, whereas the Reason-Phrase is intended for the human user.
The first digit of the Status-Code defines the class of response. The last two
digits do not have any categorization role. For this reason, any response with a
status code between 100 and 199 is referred to as a "1xx response", any response
with a status code between 200 and 299 as a "2xx response", and so on.
SIP/2.0 allows six values for the first digit:
**1xx: Provisional -- request received, continuing to process the
request;
Authentication Header (AH): This authenticates the sender and it discovers any changes in
data during transmission.
Encapsulating Security Payload (ESP): This not only performs authentication for the
sender but also encrypts the data being sent.
Authentication header is used for authentication, and also for data integrity protection.
Authentication Header cannot encrypt the data inside the packet. However ESP could do both
authentication as well as encryption together.
There are two modes of IPsec:
Tunnel Mode: This will take the whole IP packet to form secure communication between
two places, or gateways.
In tunnel mode ipsec encrypts the entire ip packet along with its headers and then generates a
new header to stick on top of the encrypted ip packet.
Transport Mode: This only encapsulates the IP payload (not the entire IP packet as in tunnel
mode) to ensure a secure channel of communication.
IPSec transport mode is very much similar to the tunnel mode with two major differences.
It does not change the original IP header
Also it does not create a new IP header
**PURPOSE OF IPSec:
IPSEC provides confidentiality in communication with the help of encryption
IPSEC provides integrity in communication by checking data modification, which is done
through message authentication codes (MAC)
IPSEC provides authentication of both the parties in the communication
IPSEC protects the IP packets from analysis, which means you can’t say who communication
with whom is by simply looking at the packet.
Each MRF is further divided into a media resource function controller (MRFC) and a Media
Resource Function Processor (MRFP).
The MRFC is a signalling plane node that interprets information coming from an AS and S-
CSCF to control the MRFP
The MRFP is a media plane node used to mix, source or process media streams. It can also
manage access right to shared resources.
MRFC Functions:
- Manages the availability of MRFP resources
- Hides to the AS for the MRFP resources
- A SIP proxy only involved into initial INVITE
MRFP:
- Interprets & processes the commands sent by the AS
- Manages the media stream
- Performs the media processing
The Media Resource Broker (MRB) is a functional entity that is responsible for both collection
of appropriate published MRF information and supplying of appropriate MRF information to
consuming entities such as the AS. MRB can be used in two modes:
Query mode: AS queries the MRB for media and sets up the call using the response of MRB
In-Line Mode: AS sends a SIP INVITE to the MRB. The MRB sets up the call
26. Is Antenna a Passive or Active Element and why?
Antenna element is passive device but the antenna system may be active or passive
Antenna element is passive device because it does not require power supply to work
Bandwidth
Channel quality
Network load.
A. Bandwidth: - According to 3GPP specifications LTE channel bandwidth can be 1.4, 3, 5, 10, 15, 20
MHz. The wider bandwidth the higher throughput.
B. Channel quality: - Radio conditions impact user bit rates. The better radio conditions the higher
throughput is available and vice versa.
C. Network load: - Available radio resources are divided among active subscribers. So the more
subscribers are active and receive/transmit data the less resources are allocated to a given
subscriber. It also depends on subscriber and connection priorities.
LTE technology works based on three channel types viz. logical channel, transport channel and physical
channels. These channels are used by lower layers to provide services to the upper layers.
The access points to the Layer L2/L3 are transport channels. They get mapped to physical channels. These
physical channels will have different modulation code rate.
Logical channels are of two types, one carrying control information and the other carrying traffic information.
These gets mapped to transport channels as shown in the figure. The left side is downlink channel mapping
and right side is uplink channel mapping.
Physical Channels :-
PDSCH - Stands for Physical Downlink Shared Channel, mainly used to carry high speed
data/multimedia information.
PDCCH - Stands for Physical Downlink Control Channel, mainly used to carry UE specific control
information. It will have QPSK modulation used.
CCPCH - Stands for Common Control Physical Channel, carries cell-wide control information. QPSK is
used.
Transport Channels
• Downlink and Uplink transport channels carry L2/L3 information.
• It also configures LTE PHY layer.
• It sends status information such as packet error and CQI to upper layers.
• Also supports peer-peer signalling between higher layers.
Explain different layers and what is the importance of each layer and how they are being
controlled?
Physical Layer :-
Physical Layer carries all information from the MAC transport channels over the air interface.
Takes care of the link adaptation (AMC), power control, cell search (for initial synchronization and
handover purposes) and other measurements for the RRC layer.
Medium Access Layer:-
MAC channel is responsible for mapping between logical channels & transport channels.
PDCP Layer is responsible for Header compression and decompression of IP data, Transfer of data (user plane
or control plane), Maintenance of PDCP Sequence Numbers (SNs), In-sequence delivery of upper layer PDUs
at re-establishment of lower layers, Duplicate elimination of lower layer SDUs at re-establishment of lower
layers for radio bearers mapped on RLC AM, Ciphering and deciphering of user plane data and control plane
data, Integrity protection and integrity verification of control plane data, Timer based discard, duplicate
discarding, PDCP is used for SRBs and DRBs mapped on DCCH and DTCH type of logical channels.
Non –access stratum(NAS):-
The non-access stratum (NAS) protocols form the highest stratum of the control plane between the
user equipment (UE) and MME.
NAS protocols support the mobility of the UE and the session management procedures to establish
and maintain IP connectivity between the UE and a PDN GW.
B. Transport Channels:-
Broadcast Channel(BCCH):-
The LTE transport channel maps to broadcast control channel.
Downlink shared channel(DL-SCH):-
This transport channel is main channel for downlink data transfer.
Multicast channel(MCH):-
This transport channel is used to transmit MCCH information to set up a multicast transmission.
Uplink shared channel:-
This channel is main channel for uplink data transfer. It is used by many logical channels.
Random Access channels:-
This is used for random access requirements.
C.Logical Channels:-
Broadcast control channel:-
This control channel provides system information to all mobile terminals connected to the eNodeB.
Paging Control channel:-
This control channel is used for paging information when searching a unit on network.
Common control channel:-
This channel is used for Random access information.
Multicast Control Channel:-
This control channel is used for information needed for multicast reception.
Dedicated control Channel:-
This control channel is used for carrying user specific control information.
EX: - for controlling action including power control, handover etc.
Dedicated Traffic channels:-
This traffic channel is used for the transmission of user data.
Multicast traffic channel:-
This channel is used for the transmission of multicast data.
Orthogonal frequency division multiple-access (OFDMA) is used for the downlink, and SC- FDMA is used for
the uplink as multiple-access schemes in the LTE system.
In LTE (4G) to avoid multipath fading we use OFDMA technique in downlink. The main drawback of OFDMA is
high peek to average power ratio i.e. its drain the battery performance so we use SCFDMA in Uplink.
Integrity
In cellular systems, each data (speech, user data or signalling) is numbered with a so-call sequence number,
which is regularly incremented. Integrity uses a similar process based on an integrity key that is calculated by
means of a specific algorithm and the random number RAND. The source of the message computes an
authentication code with a specific algorithm, the integrity key and a regularly incremented counter. It
concatenates the authentication code to the transmitted message. The recipient computes the authentication
with the same method and the data it has in its memory and checks the received code and the computed code
are the same.
• NV browser is mainly used to change the device parameter values in 2G, 3G, 4G,
• It also shows the technology which currently used by UE,
• It also shows the preferred network type of UE.
34. Describe LTE power on procedure.
i) Power-Up Test
ii) Frequency & Time and Frame Synchronization
iii) Decode System Information Message
iv) Select Prefered Network
v) Perform RACH Process
vi) RRC Connection Setup
When a UE transmit a PRACH Preamble, it transmits with a specific pattern and this specific pattern is called a
"Signature". In each LTE cell, total 64 preamble signatures are available and UE select randomly one of these
signatures.
There is such a possibility. It means the same PRACH preamble from multiple UE reaches the NW at the same
time. This kind of PRACH collision is called "Contention" and the RACH process that allows this type of
"Contention" is called "Contention based" RACH Process. In this kind of contention based RACH process,
Network would go through additional process at later step to resolve these contention and this process is
called "Contention Resolution" step.
two UEs sent PRACH. In this case, both of the UE will receive the same T_C-RNTI and resource allocation
from network and as a result, both UE would send L2/L3 message through the same resource allocation
(meaning with the same time/frequency location) to NW. One possibility is that these two signal act as
interference to each other and NW decode neither of them. In this case, none of the UE would have any
response (HARQ ACK) from NW and they all think that RACH process has failed and go back to initial process.
The other possibility would be that NW could successfully decode the message from only one UE and failed
to decode it from the other UE. In this case, the UE with the successful L2/L3 decoding on NW side will get
the HARQ ACK from Network. This HARQ ACK process for L2/L3 message is called "contention resolution"
process.
Q.1.
40. Physical Channels in LTE?
Physical Channels:
Define whereas something transmitted over the air. Data and signalling messages are carried on physical channels b
etween the different levels of the physical layer. Physical channels are divided into two parts:
Physical Data Channels
Physical Control Channels
Physical Data Channels:
Physical downlink shared channel (PDSCH)
Carries user specific data (DL Payload).
Carries Random Access Response Message in case of PDSCH mapped to RACH channel.
42. Bearer
Bearer is just a virtual concept. It defines how the UE data is treated when it travels across the network. Network might
treat some data in a special way and treat others normally.
Some flow of data might be provided guaranteed bit rate while other may face low transfer. E.g. Person A will always
get at least 256 Kbps download speed on his LTE phone while for person B there is no guaranteed bit rate and might face
extremely bad download speed at times
-Default Bearer
When LTE UE attaches to the network for the first time, it will be assigned default bearer which remains as long as UE is
attached.
Default bearer is best effort service.
Each default bearer comes with an IP address. UE can have additional default bearers as well.
Each default bearer will have a separate IP address.
QCI 5 to 9 (Non- GBR) can be assigned to default bearer.
Default bearer is one of the main bearer which is created at the time of initial attach procedure or at the time of new
PDN connection.
Default bearer is a non-GBR bearer and provide always on IP connectivity.
-Dedicated Bearer
Dedicated bearers provides dedicated tunnel to one or more specific traffic (i.e. VoIP, video etc.)
Dedicated bearer acts as an additional bearer on top of default bearer.
It does not require separate IP address due to the fact that only additional default bearer needs an IP address and
therefore dedicated bearer is always linked to one of the default bearer established previously.
GBR provides guaranteed bit rate and is associated with parameters like GBR and MBR
GBR: The minimum guaranteed bit rate per EPS bearer. Specified independently for uplink and downlink
MBR: The maximum guaranteed bit rate per EPS bearer. Specified independently for uplink and downlink
Non-GBR bearer does not provide guaranteed bit rate and has parameter like A- AMBR and UE- AMBR
A-AMBR: APN Aggregate maximum bit rate is the maximum allowed total non-GBR throughput to specific APN. It is
specified interdependently for uplink and downlink
UE -AMBR: UE Aggregate maximum bit rate is the maximum allowed total non-GBR throughput among all APN to a
specific UE.
Dedicated bearer can be GBR or non-GBR .For services like volte we need to provide better user experience and this is
where dedicated bearer would come handy.
Dedicated bearer uses “Traffic flow templates (TFT)” to give special treatment to specific services dedicated bearer is
created when the requested service can't be fulfilled through default bearer. Some services required a high level of qos
like voice call. So network create a dedicated bearer with required qos.
Dedicated bearer may be Non-GBR or GBR depend of qci (qos class identifier) value.
Dedicated bearer can be created/release based on requirement but default bearer is created only all on IP connectivity
and released only at the time of detach/PDN disconnection.
AS Security:
The purpose of AS security is to securely deliver RRC messages between a UE and an eNB in the control plane and IP
packets in the user plane using AS security keys.
The AS security keys are derived from KeNB and new keys are generated every time a new radio link is established (that
is, when RRC state moves from idle to connected).
After the AS security setup is completed, the UE and the eNB get to share an RRC integrity key (K RRCint), RRC encryption
key (KRRCenc) and user plane encryption key (KUPenc).
Encryption and integrity protection using these keys are performed at the PDCP layer.
KRRCint and KRRCenc are used to securely deliver RRC messages in the control plane through an SRB (Signaling Radio Bearer)
over radio links.
The RRC messages are integrity protected using KRRCint and encrypted using KRRCenc at the PDCP layer before being sent.
KUPenc is used to securely deliver IP packets in the user plane through a DRB (Data Radio Bearer) over radio links.
The IP packets are encrypted using KUPenc at the PDCP layer before being sent.
ARQ stands for Automatic Repeat Request. This is the protocol used at data link layer. It uses CRC to
determine whether the packet received is correct or not.
If the packet is received correctly receiver send ACK to the transmitter, but if the packet is received
incorrectly receiver send NACK to the transmitter.
After receiving NACK transmitter re-transmits the same packet again.
HARQ
The hybrid-ARQ mechanism provides very fast retransmissions which is suitable for high speeds used
in LTE
Works at PHY layer but controlled by MAC layer.
If the received data has an error then the Receiver buffers the data and requests a re-transmission from
the sender.
When the receiver receives the re-transmitted data, it then combines it with buffered data prior to
channel decoding and error detection. This helps the performance of the re-transmissions.
The sending entity buffers the transmitted data until an ACK is received, because if NACK is received
then it has to re-transmit the data.
The first is Demodulation Reference Signals (DM-RS) which are used to enable coherent signal
demodulation at the eNodeB. These signals are time multiplexed with uplink data and are
transmitted on the fourth or third SC-FDMA symbol of an uplink slot for normal or extended CP,
respectively, using the same bandwidth as the data.
The second is Sounding Reference Signal (SRS) which is used to allow channel dependent (i.e.
frequency selective) uplink scheduling as the DM-RS cannot be used for this purposes since they are
assigned over the assigned bandwidth to a UE. The SRS is introduced as a wider band reference signal
typically transmitted in the last SC-FDMA symbol of a 1 ms sub frame
User data transmission is not allowed in this block, which results in about 7% reduction in uplink
capacity. The SRS is an optional feature and is highly configurable to control overhead--it can be turned
off in a cell. Users with different transmission bandwidth share this sounding channel in the frequency
domain.
ANS:-PLMN stands for Public Land Mobile Network. The LTE compliant UE is responsible for selecting a PLMN
for subsequent cell selection. A PLMN is identified by its PLMN identity broadcast within SIB-1. A single cell
can belong to multiple PLMNs, so SIB-1 may broadcast a list of PLMN identities.
• Following are two steps for PLMN selection:
STEP-2:The LTE NAS layer is responsible for selecting a PLMN from these list of reported PLMN.
• STEP-1: Let us see how NAS layer gets requested information from AS layer:
• STEP-2: NAS layer selects PLMN from reported list. It utilizes USIM information for PLMN selection:
3. PLMN and RAT combinations defined within operator controlled PLMN selector
The LTE UE searches all supported access technologies before PLMN selection using last two steps 4 and 5
mentioned above.
• In the case of manual selection, UE presents end user with available PLMN, listing them in the order
ANS:- 1. dB is used to quantify ratio between two intensity or power values while dBm is used to express
an absolute value of power.
3. dB is relative often relative to the power of the input signal while dBm is always relative to 1 mW signal.
54. Explain different HANDOVER events like A1, A2, A3, A4, A5 & B1, B2.
ANS: - There are total 7events which trigger measurement reports.
S intra –system events [A1-A5]
Z inter-system events [B1-B2]
A1:- This is triggered when serving cell becomes better than a threshold (Measserv-hyst >
threshold)
A2:- This is triggered when serving cell becomes worse than a threshold (Measserv-hyst <
threshold)
A3:- This is triggered when neighboring cell becomes better than the serving cell by an offset
.Offset can be +VE or –VE.
A4:- It is triggered when a neighboring cell becomes better than a threshold.
A5:- It is triggered when serving cell becomes worse than threshold-1, while a neighboring
cell becomes better than threshold-2.
B1:- It is triggered when a neighboring inter-system cell becomes better than threshold.
B2:- It is triggered when serving cell becomes worse than threshold-1 while neighboring inter-
system cell becomes better than threshold-2.
Physical channels: These are transmission channels that carry user data and control
messages.
Transport channels: The physical layer transport channels offer information transfer to
Medium Access Control (MAC) and higher layers.
Logical channels: Provide services for the Medium Access Control (MAC) layer within the
LTE protocol structure.
3G LTE physical channels
The LTE physical channels vary between the uplink and the downlink as each has different
requirements and operates in a different manner.
Downlink:
o Physical Downlink Control Channel (PDCCH) : The main purpose of this physical
channel is to carry mainly scheduling information of different types:
Downlink resource scheduling
Uplink power control instructions
Uplink resource grant
Indication for paging or system information
o Physical Hybrid ARQ Indicator Channel (PHICH): As the name implies, this channel
is used to report the Hybrid ARQ status. It carries the HARQ ACK/NACK signal
indicating whether a transport block has been correctly received.
Uplink:
o Physical Uplink Control Channel (PUCCH): The Physical Uplink Control Channel,
PUCCH provides the various control signalling requirements.
Physical Uplink Shared Channel (PUSCH) : This physical channel found on the LTE uplink is
the Uplink counterpart of PDSCH
Physical Random Access Channel (PRACH): This uplink physical channel is used for random
access functions. This is the only non-synchronised transmission that the UE can make within
LTE.
LTE transport channels
The LTE transport channels vary between the uplink and the downlink as each has different
requirements and operates in a different manner. Physical layer transport channels offer
information transfer to medium access control (MAC) and higher layers.
Downlink:
o Broadcast Channel (BCH) : The LTE transport channel maps to Broadcast Control
Channel (BCCH)
o Downlink Shared Channel (DL-SCH): This transport channel is the main channel for
downlink data transfer. It is used by many logical channels.
o Paging Channel (PCH) : To convey the PCCH
o Multicast Channel (MCH): This transport channel is used to transmit MCCH
information to set up multicast transmissions.
Uplink:
o Uplink Shared Channel (UL-SCH): This transport channel is the main channel for
uplink data transfer. It is used by many logical channels.
o Random Access Channel (RACH): This is used for random access requirements.
Control channels: these LTE control channels carry the control plane information:
Traffic channels: These LTE traffic channels carry the user-plane data:
o Dedicated Traffic Channel (DTCH): This traffic channel is used for the transmission
of user data.
o Multicast Traffic Channel (MTCH): This channel is used for the transmission of
multicast data.
Spectral 16.3 for 4x4 MIMO in the downlink, 30 for 8x8 MIMO in the
Efficiency(peak 4.32 for 64QAM SISO case in the downlink, 15 for 4x4 MIMO in
b/s/Hz) Uplink the Uplink
Contention free: In this case Network will allocate these preamble signature so that it would
not collide. This kind of RACH process is called "Contention Free" RACH procedure. To initiate
the "Contention Free" RACH process.