LTE Advanced Pro - Frédéric Launay - E-Book

LTE Advanced Pro E-Book

Frédéric Launay

0,0
139,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

This book presents LTE evolution towards 5G mobile communication and the emergence of new requirements for MBB, MTC and LLC services. As LTE technologies evolve, LTE Advanced Pro dramatically increases cell capacity and user data rates for the MBB unicast service. Such requirements are obtained using full-dimension MIMO, carrier aggregation (on either licensed or unlicensed frequency bands) and dual connectivity. To improve the efficiency of same-content delivery to multiple users, 3GPP proposes a group communications service over LTE and defines mission critical push-to-talk (MCPTT) for dedicated public safety services. Complementary low-cost and low-power modems with enhanced coverage and massive connectivity are emerging. Thus, this book also discusses the need for LTE to support low-rate transmission and high-latency communication for MTC services.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 322

Veröffentlichungsjahr: 2019

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Cover

List of Abbreviations

Introduction

I.1. LTE standard

I.2. LTE Advanced standard

I.3. LTE Advanced Pro standard

I.4. Wi-Fi integration

I.5. 5G integration

1 MBB Service – Network Architecture

1.1. Initial architecture

1.2. CUPS architecture

1.3. Heterogeneous networks

2 MBB Service – Spatial Multiplexing

2.1. Multiplexing techniques

2.2. Antenna ports

2.3. UCI

2.4. Transmission modes

2.5. FD-MIMO mechanism

2.6. eFD-MIMO mechanism

3 MBB Service – Carrier Aggregation

3.1. Functional architecture

3.2. LTE aggregation

3.3. LAA aggregation

3.4. LWA aggregation

3.5. LWIP aggregation

4 Wi-Fi Integration – Network Architecture

4.1. Functional architecture

4.2. Tunnel establishment

4.3. DIAMETER protocol

5 Wi-Fi Integration – Procedures

5.1. Mutual authentication

5.2. SWu tunnel establishment

5.3. S2a/S2b tunnel establishment

5.4. S2c tunnel establishment

6 Wi-Fi Integration – Network Discovery and Selection

6.1. Mechanisms defined by 3GPP organization

6.2. Mechanisms defined by IEEE and WFA organizations

7 LLC Service – Proximity Communications

7.1. Introduction

7.2. Functional architecture

7.3. Direct discovery

7.4. Radio interface

8 LLC Service – Group Communications

8.1. Introduction

8.2. Transport architecture

8.3. Service architecture

8.4. Radio interface

8.5. Procedures

9 LLC Service – GCSE and MCPTT Functions

9.1. Introduction

9.2. GCSE function

9.3. MCPTT function

9.4. Procedures

10 MTC Service – Network Architecture

10.1. Functional architecture

10.2. Network optimization

10.3. Congestion control

10.4. Procedures

11 MTC Service – Radio Interfaces

11.1. Introduction

11.2. Special features

11.3. LTE-M interface

11.4. NB-IoT interface

12 MBB Service – 5G Integration

12.1. Deployment options

12.2. Functional architecture

12.3. Protocol architecture

12.4. Procedures

12.5. Transmission chain

References

Index

End User License Agreement

List of Tables

Chapter 1

Table 1.1. Different types of X2-based handover

Table 1.2. CPRI payload rate

Table 1.3. CPRI rate

Table 1.4. Number of radio channels carried on the CPRI

Chapter 2

Table 2.1. Association of the antenna ports and reference signals: downlink

Table 2.2. Numbering of antenna ports for the uplink

Table 2.3. Transfer modes of the aperiodic reports

Table 2.4. Transfer modes of the periodic reports

Table 2.5. Downlink transmission modes

Table 2.6. Correspondence between the configuration of the antennas and modes of...

Table 2.7. Comparison between MIMO and FD-MIMO

Table 2.8. Constitution of the antenna ports: FD-MIMO

Table 2.9. Constitution of the antenna ports: eFD-MIMO

Chapter 3

Table 3.1. LTE mobile categories from release 8

Table 3.2. LTE Advanced mobile categories

Table 3.3. Mobile categories for the downlink from release 12

Table 3.4. Mobile categories for the uplink from release 12

Table 3.5. Type-2 frame configuration

Chapter 4

Table 4.1. DIAMETER messages on the SWx interface

Table 4.2. DIAMETER messages on the STa and SWa interfaces

Table 4.3. DIAMETER messages on the S6b interface

Table 4.4. DIAMETER messages on the SWm interface

Table 4.5. DIAMETER messages on the Gx, Gxa and Gxb interfaces

Chapter 6

Table 6.1. ANQP information elements

Chapter 8

Table 8.1. Transport of the RRC message

Table 8.2. Message transport relating to counting

Chapter 9

Table 9.1. QoS class identifier

Chapter 11

Table 11.1. PRBs allocated to the synchronization signals

Table 11.2. RU structure

Chapter 12

Table 12.1. Spacing between sub-carriers

Table 12.2. PRB number

Table 12.3. Radio channel bandwidth

Table 12.4. Time frame structure

Table 12.5. PSS, SSS and PBCH location: NR interface

List of Illustrations

Chapter 1

Figure 1.1. Functional architecture of the EPS network

Figure 1.2. Protocol architecture: the control plane

Figure 1.3. Protocol architecture: the user plane

Figure 1.4. Protocol architecture of the LTE-Uu interface

Figure 1.5. The downlink chain of transmission

Figure 1.6. The uplink chain of transmission

Figure 1.7. Protocol architecture of the X2 interface: the control plane

Figure 1.8. Protocol architecture of the user plane during the handover based on...

Figure 1.9. CUPS architecture

Figure 1.10. Protocol architecture of the Sx interface: the control plane

Figure 1.11. Functional architecture implementing the HeNB station: variant 1

Figure 1.12. Functional architecture implementing the HeNB station: variant 2

Figure 1.13. Functional architecture implementing the HeNB station: variant 3

Figure 1.14. Functional architecture implementing the relay node

Figure 1.15. Connecting the relay node: the control plane

Figure 1.16. Connecting the mobile: the control plane

Figure 1.17. Connecting the mobile: the user plane

Figure 1.18. Protocol architecture of the X2 interface: the control plane

Figure 1.19. Protocol architecture of the X2 interface: the user plane

Figure 1.20. C-RAN architecture

Figure 1.21. Distribution of functions between the BBU and RRH modules

Figure 1.22. Functional architecture implementing dual connectivity

Figure 1.23. Protocol architecture of the radio interface implementing dual conn...

Chapter 2

Figure 2.1. SU-MIMO mechanism

Figure 2.2. MU-MIMO mechanism

Figure 2.3. Beamforming

Figure 2.4. Antenna configurations

Figure 2.5. Beamforming in different planes

Figure 2.6. AAS

Figure 2.7. Mapping between the TXU/TRU and the antenna elements

Figure 2.8. CSI-RS mapping: FD-MIMO

Figure 2.9. CSI-RS reference signal mapping: eFD-MIMO

Chapter 3

Figure 3.1. Functional architecture for LTE and Wi-Fi carrier aggregation

Figure 3.2. Radio channel aggregation

Figure 3.3. Inter-carrier scheduling

Figure 3.4. Structure of type-1 frame

Figure 3.5. Structure of type-2 frame

Figure 3.6. LBT mechanism: FBE option

Figure 3.7. LBT mechanism: LBE option

Figure 3.8. Protocol architecture for LWA: collocated eNB and AP entities

Figure 3.9. Protocol architecture for LWA: distant eNB and AP entities

Figure 3.10. WT Addition procedure

Figure 3.11. WT Modification procedure initiated by the eNB entity

Figure 3.12. WT Modification procedure initiated by the access point

Figure 3.13. WT Release procedure initiated by the eNB entity

Figure 3.14. WT Release procedure initiated by the access point

Figure 3.15. Protocol architecture for the LWIP aggregation

Figure 3.16. LWIP and IPSec tunnel establishment

Chapter 4

Figure 4.1. Functional architecture based on the S2a interface

Figure 4.2. Connection to the PDN for the architecture based on the S2a interfac...

Figure 4.3. Functional architecture based on the S2b interface

Figure 4.4. Connection to the PDN for the architecture based on the S2b interfac...

Figure 4.5. Functional architecture based on the S2c interface trusted Wi-Fi acc...

Figure 4.6. Functional architecture based on the S2c interface untrusted Wi-Fi a...

Figure 4.7. Protocol architecture based on the S2a interface control plane for t...

Figure 4.8. Protocol architecture based on the S2a interface user plane for the ...

Figure 4.9. Protocol architecture based on the S2a interface control plane for t...

Figure 4.10. Protocol architecture based on the S2a interface user plane for the...

Figure 4.11. Protocol architecture based on the S2a interface control plane for ...

Figure 4.12. Protocol architecture based on the S2a interface user plane for the...

Figure 4.13. Protocol architecture based on the S2b interface control plane for ...

Figure 4.14. Protocol architecture based on the S2b interface user plane for the...

Figure 4.15. Protocol architecture based on the S2c interface control plane for ...

Figure 4.16. Protocol architecture based on the S2c interface user plane for the...

Figure 4.17. AAA server interfaces using the DIAMETER protocol

Figure 4.18. PCRF interfaces using the DIAMETER protocol

Chapter 5

Figure 5.1. Transport of the EAP-AKA’ messages

Figure 5.2. Mutual authentication procedure

Figure 5.3. Procedure for rapid renewal of authentication

Figure 5.4. SWu tunnel establishment procedure

Figure 5.5. Procedure for rapid renewal of authentication

Figure 5.6. PMIPv6 architecture

Figure 5.7. S2a tunnel establishment using the PMIPv6 mechanism

Figure 5.8. S2b tunnel establishment using PMIPv6 mechanism

Figure 5.9. S2a tunnel establishment using the GTPv2 mechanism

Figure 5.10. Components of mobility

Figure 5.11. S2a tunnel establishment using the MIPv4 FA mechanism

Figure 5.12. S2c tunnel establishment: trusted Wi-Fi access

Figure 5.13. S2c tunnel establishment: untrusted Wi-Fi access

Chapter 6

Figure 6.1. ANDI

Figure 6.2. ISMP

Figure 6.3. IFOM rules

Figure 6.4. MAPCON rules

Figure 6.5. NSWO rules

Figure 6.6. IARP rules

Figure 6.7. WLANSP

Figure 6.8. Wi-Fi access network preferences

Figure 6.9. GAS/ANQP exchanges

Chapter 7

Figure 7.1. Deployment scenarios for D2D communications

Figure 7.2. Different types of V2X communication

Figure 7.3. Functional architecture: D2D communications

Figure 7.4. Transport of the HTTP/XML message

Figure 7.5. Functional architecture: V2X communications

Figure 7.6. eNB-type and UE-type RSU

Figure 7.7. Radio interface structure

Figure 7.8. Resources allocated to the sidelink

Figure 7.9. Resources allocated to SLSS and PSBCH

Figure 7.10. Resources allocated to the sidelink: adjacent resource blocks

Figure 7.11. Resources allocated to the sidelink: non-adjacent resource blocks

Figure 7.12. DMRS associated with PSCCH and PSSCH

Figure 7.13. DMRS associated with SLSS and PSBCH

Chapter 8

Figure 8.1. eMBMS network: transport architecture

Figure 8.2. eMBMS network: service architecture

Figure 8.3. Structure of the BM-SC entity

Figure 8.4. Setting up the keys

Figure 8.5. Protocol architecture of the Ua interface

Figure 8.6. Mapping of the MBSFN-RS: a step of 15 kHz between the sub-carriers

Figure 8.7. Mapping of the MBSFN-RS: a step of 7.5 kHz between the sub-carriers

Figure 8.8. Processing associated with the PMCH

Figure 8.9. Turbo code

Figure 8.10. Allocation of frames and sub-frames to the MBMS

Figure 8.11. MCCH scheduling

Figure 8.12. MTCH scheduling

Figure 8.13. Mutual authentication

Figure 8.14. Mobile registration

Figure 8.15. Multicast bearer establishment

Chapter 9

Figure 9.1. GCSE function

Figure 9.2. Application services

Figure 9.3. Management services

Figure 9.4. MCPTT-1 interfaces

Figure 9.5. MCPTT-3 interfaces

Figure 9.6. Group creation

Figure 9.7. Group affiliation

Figure 9.8. Session pre-establishment: group call

Figure 9.9. Group call

Figure 9.10. Private call: automatic start-up mode

Figure 9.11. Private call: manual start-up mode

Figure 9.12. Floor

Chapter 10

Figure 10.1. Network architecture

Figure 10.2. Different variants of data transmission

Figure 10.3. RRC Suspend procedure

Figure 10.4. RRC Resume procedure

Figure 10.5. LAPI notification

Figure 10.6. Congestion control: session establishment reject

Figure 10.7. Congestion control: attachment reject

Figure 10.8. Congestion control: connection reject

Figure 10.9. Triggering procedure by short message

Figure 10.10. Group message delivery

Figure 10.11. HSS and MME configuration: single process

Figure 10.12. HSS and MME configuration: group process

Figure 10.13. PGW configuration: single process

Figure 10.14. PGW configuration: group process

Figure 10.15. NIDD configuration

Figure 10.16. Downlink NIDD transfer

Figure 10.17. Uplink NIDD transfer

Chapter 11

Figure 11.1. PSM

Figure 11.2. Guard time

Figure 11.3. PBCH structure

Figure 11.4. NB-IoT radio channel

Figure 11.5. Physical resource block

Figure 11.6. NPSS

Figure 11.7. NSSS

Figure 11.8. NRS

Figure 11.9. NPBCH: repetition structure

Figure 11.10. NPBCH: sub-frame structure

Figure 11.11. NPDCCH

Figure 11.12. DMRS

Figure 11.13. NPRACH

Chapter 12

Figure 12.1. SA and NSA configurations

Figure 12.2. Functional architecture

Figure 12.3. en-gNB architecture

Figure 12.4. Protocol architecture of the NR interface

Figure 12.5. Protocol architecture: mobile side

Figure 12.6. Protocol architecture: eNB and en-gNB side

Figure 12.7. Split configuration of the functions between CU and DU

Figure 12.8. Adding a secondary node

Figure 12.9. Changing a secondary node initiated by the eNB entity

Figure 12.10. Removing a secondary node initiated by the eNB entity

Figure 12.11. PSS, SSS and PBCH location: LTE interface and TDD mode

Figure 12.12. Block of PSS, SSS and PBCH

Figure 12.13. PSS, SSS and PBCH location: NR interface

Guide

Cover

Table of Contents

Begin Reading

Pages

v

iii

iv

xi

xii

xiii

xiv

xv

xvi

xvii

xviii

xix

xx

xxi

xxii

xxiii

xxiv

xxv

xxvi

xxvii

xxix

xxx

xxxi

xxxii

xxxiii

xxxiv

xxxv

xxxvi

xxxvii

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

259

260

261

262

263

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

LTE Advanced Pro

Towards the 5G Mobile Network

Frédéric Launay

André Perez

First published 2019 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.

Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address:

ISTE Ltd

27-37 St George’s Road

London SW19 4EU

UK

www.iste.co.uk

John Wiley & Sons, Inc.

111 River Street

Hoboken, NJ 07030

USA

www.wiley.com

© ISTE Ltd 2019

The rights of Frédéric Launay and André Perez to be identified as the authors of this work have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988.

Library of Congress Control Number: 2019933515

British Library Cataloguing-in-Publication Data

A CIP record for this book is available from the British Library

ISBN 978-1-78630-430-8

List of Abbreviations

3GPP:

3rd Generation Partnership Project

5GC:

5G Core

5G NR:

5G New Radio

A

AA:

Antenna Array

AAA:

Authentication, Authorization and Accounting

AAA:

Authenticate-Authorize-Answer

AAR:

Authenticate-Authorize-Request

AAS:

Active Antenna System

ADM:

Activation/Deactivation MAC

AES:

Advanced Encryption Standard

AESE:

Architecture Enhancements for Service capability Exposure

AF:

Application Function

AH:

Authentication Header

AIA:

Authentication-Information-Answer

AIR:

Authentication-Information-Request

AKA:

Authentication and Key Agreement

AM:

Acknowledged Mode

AMBR:

Aggregate Maximum Bit Rate

ANDI:

Access Network Discovery Information

ANDSF:

Access Network Discovery and Selection Function

ANQP:

Access Network Query Protocol

AP:

Access Point

AP:

Application Part

API:

Application Programming Interface

APN:

Access Point Name

ARP:

Allocation and Retention Priority

ARQ:

Automatic Repeat reQuest

AS:

Application Server

ASA:

Abort-Session-Answer

ASR:

Abort-Session-Request

AUTN:

Authentication Network

B

BBU:

Base Band Unit

BCE:

Binding Cache Entry

BIA:

Bootstrapping-Info-Answer

BIR:

Bootstrapping-Info-Request

BM-SC:

Broadcast/Multicast Service Center

BSF:

Bootstrapping Server Function

BSSID:

Basic Service Set Identifier

B-TID:

Bootstrapping Transaction Identifier

BWP:

Bandwidth Part

C

CA:

Carrier Aggregation

CC:

Component Carrier

CCA:

Clear Channel Assessment

CCA:

Credit-Control-Answer

CCR:

Credit-Control-Request

CDD:

Cyclic Delay Diversity

CE:

Coverage Extension

CIA:

Configuration-Information-Answer

CIoT:

Cellular Internet of Things

CIR:

Configuration-Information-Request

CK:

Cipher Key

CMA:

Connection-Management-Answer

CMR:

Connection-Management-Request

CN:

Correspondent Node

CNA:

Correspondent Node Address

CoA:

Care of Address

CoMP:

Coordinated Multi Point

CP:

Control Plane

CPRI:

Common Public Radio Interface

CQI:

Channel Quality Indicator

CRC:

Cyclic Redundancy Check

CRI:

CSI Resource Index

CRS:

Cell-specific Reference Signal

CS:

Circuit-Switched

CSFB:

Circuit-Switched Fallback

CSI:

Channel State Information

CSMA/CA:

Carrier Sense Multiple Access/Collision Avoidance

CU:

Centralized Unit

CUPS:

Control and User Plane Separation

D

D2D:

Device to Device

DAA:

Device-Action-Answer

DAR:

Device-Action-Request

DC:

Dual Connectivity

DCI:

Downlink Control Information

DEA:

Diameter-EAP-Answer

DeNB:

Donor eNB

DER:

Diameter-EAP-Request

DFT-S-OFDM:

Discrete Fourier Transform Spread OFDM

D–H:

Diffie–Hellman

DHCP:

Dynamic Host Configuration Protocol

DL:

Downlink

DL-SCH:

Downlink Shared Channel

DMRS:

Demodulation Reference Signal

DMTC:

Discovery Measurement Timing Configuration

DNA:

Device-Notification-Answer

DNR:

Device-Notification-Request

DNS:

Domain Name System

DoA:

Direction of Arrivals

DRA:

Device-Report-Answer

DRB:

Data Radio Bearer

DRR:

Device-Report-Request

DRS:

Discovery Reference Signal

DSCP:

DiffServ Code Point

DSMIPv6:

Dual-Stack Mobile IP version 6

DTA:

Device-Trigger-Answer

DTR:

Device-Trigger-Request

DU:

Distributed Unit

DwPTS:

Downlink Pilot Time Slot

E

EAP:

Extensible Authentication Protocol

EAPOL:

EAP Over LAN

EBF:

Elevation Beamforming

ECGI:

E-UTRAN Cell Global Identifier

eCPRI:

enhanced Common Public Radio Interface

eDRX:

extended Discontinuous Reception

EHSP:

Equivalent Home Service Providers

eICIC:

enhanced Inter-Cell Interference Coordination

eLAA:

enhanced LAA

eMBMS:

evolved Multimedia Broadcast/Multicast Service

EMSK:

Extended Master Session Key

eNB:

evolved Node Base station

en-gNB:

E-UTRA-NR DC next generation Node B

EPC:

Evolved Packet Core

ePDCCH:

enhanced PDCCH

ePDG:

evolved Packet Data Gateway

EPS:

Evolved Packet System

E-RAB:

EPS Radio Access Bearer

ESP:

Encapsulating Security Payload

E-UTRAN:

Evolved Universal Terrestrial Radio Access Network

F

FA:

Foreign Agent

FAA:

Foreign Agent Address

FBE:

Frame-Based Equipment

FDD:

Frequency-Division Duplex

FD-MIMO:

Full-Dimension MIMO

FEC:

Forward Error Correction

FFT:

Fast Fourier Transform

FLUTE:

File Delivery over Unidirectional Transport

FQDN:

Full Qualified Domain Name

FR:

Frequency Range

FSTD:

Frequency Shift Transmit Diversity

G

GAA:

GCS-Action-Answer

GAR:

GCS-Action-Request

GAS:

Generic Advertisement Service

GBA:

Generic Bootstrapping Architecture

GCSE:

Group Communication System Enablers

GNA:

GCS-Notification-Answer

gNB:

next generation Node Base station

GNR:

GCS-Notification-Request

GNSS:

Global Navigation Satellite System

GP:

Gap Period

GRE:

Generic Routing Encapsulation

GTP-U:

GPRS Tunneling Protocol User

GTPv2-C:

GPRS Tunneling Protocol Control

GUTI:

Globally Unique Temporary Identity

H

HA:

Home Agent

HARQ:

Hybrid Automatic Repeat reQuest

HeNB:

Home eNB

HESSID:

Homogeneous Extended Service Set Identifier

HI:

HARQ Indicator

HNP:

Home Network Prefix

HoA:

Home Address

HSS:

Home Subscriber Server

HTTP:

Hypertext Transfer Protocol

I

IARP:

Inter-APN Routing Policy

ICE:

Interactive Connectivity Establishment

IDA:

Insert-Subscriber-Data-Answer

IDR:

Insert-Subscriber-Data-Request

IEEE:

Institute of Electrical and Electronics Engineers

IFFT:

Inverse Fast Fourier Transform

IFOM:

IP Flow Mobility

IGMP:

Internet Group Management Protocol

IK:

Integrity Key

IKEv2:

Internet Key Exchange version 2

IMS:

IP Multimedia Sub-system

IMSI:

International Mobile Subscriber Identity

IP:

Internet Protocol

IPSec:

IP Security

IP-SM-GW:

IP Short-Messaging Gateway

ISMP:

Inter-System Mobility Policy

ISRP:

Inter-System Routing Policy

L

LAA:

Licensed Assisted Access

LAPI:

Low Access Priority Indicator

LBE:

Load-Based Equipment

LBT:

Listen Before Talk

LCID:

Logical Channel Identifier

LDPC:

Low-Density Parity Check

LLC:

Low Latency Communication

LLC:

Logical Link Control

LMA:

Local Mobility Anchor

LMAA:

LMA Address

LMD:

Local Mobility Domain

LTE:

Long-Term Evolution

LWA:

LTE–Wi-Fi Aggregation

LWAAP:

LWA Adaptation Protocol

LWIP:

LTE/WLAN radio level integration with IPsec tunnel

LWIPEP:

LWIP Encapsulation Protocol

M

MAA:

Multimedia-Authentication-Answer

MAC:

Medium Access Control

MAC:

Message Authentication Code

MAG:

Mobile Access Gateway

MAPCON:

Multi-Access PDN Connectivity

MAR:

Multimedia-Authentication-Request

MBB:

Mobile Broadband

MBMS GW:

MBMS Gateway

MBSFN:

MBMS Single-Frequency Network

MCC:

Mobile Country Code

MCCH:

Multicast Control Channel

MCE:

Multi-cell/Multicast Coordination Entity

MCG:

Master Cell Group

MCH:

Multicast Channel

MCL:

Maximum Coupling Loss

MCM:

Multi-Connection Mode

MCPTT:

Mission Critical Push-to-Talk

MCS:

Modulation and Coding Scheme

MEC:

Mobile Edge Computing

MeNB:

Master eNB

MIB:

Master Information Block

MIB-NB:

MIB NarrowBand

MIKEY:

Multimedia Internet KEYing

MIMO:

Multiple Input Multiple Output

MIP:

Mobile IP

MIP-RK:

MIP Root Key

MIPv4 FA:

Mobile IP version 4 Foreign Agent

MISO:

Multiple Input Single Output

MLP:

Mobile Location Protocol

MME:

Mobility Management Entity

MN:

Mobile Node

MNC:

Mobile Network Code

MO:

Management Object

MPDCCH:

MTC PDCCH

MRK:

MBMS Request Key

MSC:

Mobile Switching Center

MSK:

Master Session Key

MSK:

MBMS Service Key

MTC:

Machine Type Communication

MTCH:

Multicast Traffic Channel

MTK:

MBMS Traffic Key

MUK:

MBMS User Key

MU-MIMO:

Multi-User MIMO

N

NAI:

Network Access Identifier

NAPT:

Network Address and Port Translation

NAS:

Non-Access Stratum

NAT:

Network Address Translation

NB-IoT:

NarrowBand Internet of Things

NCCE:

Narrowband Control Channel Element

NFV:

Network Function Virtualization

NIA:

NIDD-Information-Answer

NIDD:

Non-IP Data Delivery

NIR:

NIDD-Information-Request

NPBCH:

Narrowband PBCH

NPDCCH:

Narrowband PDCCH

NPDSCH:

Narrowband PDSCH

NPRACH:

Narrowband PRACH

NPSS:

Narrowband PSS

NPUSCH:

Narrowband PUSCH

NRS:

Narrowband Reference Signal

NSA:

Non-Standalone

NSSS:

Narrowband SSS

NSWO:

Non-Seamless WLAN Offload

O

OCC:

Orthogonal Covering Code

ODA:

MO-Data-Answer

ODR:

MO-Data-Request

OFDM:

Orthogonal Frequency-Division Multiplexing

OFDMA:

Orthogonal Frequency-Division Multiple Access

OPI:

Offload Preference Indication

OTDOA:

Observed Time Difference Of Arrival

P

PBA:

Proxy Binding Acknowledgment

PBCH:

Physical Broadcast Channel

PBU:

Proxy Binding Update

PCCC:

Parallel Concatenated Convolutional Code

PCEF:

Policy and Charging Enforcement Function

PCFICH:

Physical Control Format Indicator Channel

PCI:

Physical-layer Cell Identity

PCRF:

Policy and Charging Rules Function

PDCCH:

Physical Downlink Control Channel

PDCP:

Packet Data Convergence Protocol

PDN:

Packet Data Network

PDSCH:

Physical Downlink Shared Channel

PFCP:

Packet Forwarding Control Protocol

PGW:

PDN Gateway

PGW-C:

PGW Controller

PGW-U:

PGW User

PHICH:

Physical HARQ Indicator Channel

PHR:

Power HeadRoom

PMCH:

Physical Multicast Channel

PMI:

Precoder Matrix Indicator

PMIPv6:

Proxy Mobile IP version 6

PMK:

Pairwise Master Key

PPA:

Push-Profile-Answer

PPR:

Push-Profile-Request

PRACH:

Physical Random Access Channel

PRB:

Physical Resource Block

ProSe:

Proximity Service

PRS:

Positioning Reference Signal

PS:

Packet-Switched

PSBCH:

Physical Sidelink Broadcast Channel

PSCCH:

Physical Sidelink Control Channel

PSDCH:

Physical Sidelink Discovery Channel

PSM:

Power Saving Mode

PSPL:

Preferred Service Provider List

PSS:

Primary Synchronization Signal

PSSCH:

Physical Sidelink Shared Channel

PSSS:

Primary Sidelink Synchronization Signal

PTRS:

Phase Tracking Reference Signal

PUCCH:

Physical Uplink Control Channel

PUSCH:

Physical Uplink Shared Channel

Q

QAM:

Quadrature Amplitude Modulation

QCI:

QoS Class Identifier

QFI:

QoS Flow Identifier

QoS:

Quality of Service

QPP:

Quadratic Permutation Polynomial

QPSK:

Quadrature Phase-Shift Keying

R

RAA:

Re-Auth-Answer

RAR:

Re-Auth-Request

RAR:

Random Access Response

RB:

Resource Block

RDN:

Radio Distribution Network

RF:

Radio Frequency

RI:

Rank Indicator

RIA:

Reporting-Information-Answer

RIR:

Reporting-Information-Request

RLC:

Radio Link Control

RN:

Relay Node

RNTI:

Radio Network Temporary Identifier

ROHC:

Robust Header Compression

RP:

Resource Pool

RRC:

Radio Resource Control

RRH:

Remote Radio Head

RS:

Reference Signal

RSRP:

Reference Signal Received Power

RSRQ:

Reference Signal Received Quality

RSSI:

Received Signal Strength Indication

RSU:

Road Side Unit

RTA:

Registration-Termination-Answer

RTP:

Real-time Transport Protocol

RTR:

Registration-Termination-Request

RU:

Resource Unit

S

SA:

Security Association

SA:

Standalone

SAA:

Server-Assignment-Answer

SAR:

Server-Assignment-Request

SBCCH:

Sidelink Broadcast Control Channel

SC:

Sidelink Control

SCEF:

Service Capability Exposure Function

SC-FDMA:

Single-Carrier Frequency-Division Multiple Access

SCG:

Secondary Cell Group

SCH:

Sub-Channel

SCI:

Sidelink Control Information

SCM:

Single-Connection Mode

SC-PTM:

Single-Cell Point-To-Multipoint

SCS:

Services Capability Server

SCTP:

Stream Control Transmission Protocol

SDAP:

Service Data Adaptation Protocol

SDF:

Service Data Flow

SDL:

Supplementary Downlink

SDN:

Software-Defined Networking

SDP:

Session Description Protocol

SeGW:

Security Gateway

SeNB:

Secondary eNB

SFBC:

Space Frequency Block Coding

SGW:

Serving Gateway

SGW-C:

SGW Controller

SGW-U:

SGW User

SIA:

Subscriber-Information-Answer

SIB:

System Information Block

SIMO:

Single Input Multiple Output

SIP:

Session Initiation Protocol

SIR:

Subscriber-Information-Request

SISO:

Single Input Single Output

SL:

Sidelink

SL-BCH:

Sidelink Broadcast Channel

SL-DCH:

Sidelink Discovery Channel

SLI:

Sidelink Identifier

SL-MIB:

Sidelink Master Information Block

SLP:

SUPL Location Platform

SL-SCH:

Sidelink Shared Channel

SLSS:

Sidelink Synchronization Signal

SMS:

Short Message Service

SMS-SC:

SMS Service Center

SPR:

Subscription Profile Repository

SR:

Scheduling Request

SRB:

Signaling Radio Bearer

SRS:

Sounding Reference Signal

SSID:

Service Set Identifier

SSS:

Secondary Synchronization Signal

SSSS:

Secondary Sidelink Synchronization Signal

STA:

Session Termination Answer

STCH:

Sidelink Traffic Channel

STR:

Session Termination Request

SUL:

Supplementary Uplink

SU-MIMO:

Single-User MIMO

SUPL:

Secure User Plane Location

T

TAI:

Tracking Area Identity

TBCC:

Tail-Biting Convolutional Coding

TC:

Traffic Class

TDA:

MT-Data-Answer

TDD:

Time-Division Duplex

TDMA:

Time-Division Multiple Access

TDR:

MT-Data-Request

TEID:

Tunnel Endpoint Identifier

TFT:

Traffic Flow Template

TM:

Transparent Mode

TMGI:

Temporary Mobile Group Identity

TRP:

Time Repetition Pattern

TSC:

Transparent Single-Connection

TTI:

Transmission Time Interval

TWAG:

Trusted WLAN Access Gateway

TWAN:

Trusted WLAN Access Network

TWAP:

Trusted WLAN AAA Proxy

U

UCI:

Uplink Control Information

UE:

User Equipment

UICC:

Universal Integrated Circuit Card

UL:

Uplink

UM:

Unacknowledged Mode

U-NII:

Unlicensed National Information Infrastructure

UP:

User Plane

UpPTS:

Uplink Pilot Time Slot

V, W, X

V2I:

Vehicle to Infrastructure

V2N:

Vehicle to Network

V2P:

Vehicle to Pedestrian

V2V:

Vehicle to Vehicle

V2X:

Vehicle to everything

VoLTE:

Voice over LTE

WCDMA:

Wideband Code-Division Multiple Access

WFA:

Wi-Fi Alliance

Wi-Fi:

Wireless Fidelity

WLAN:

Wireless Local Area Network

WLANSP:

WLAN Selection Policy

WLCP:

WLAN Control Plane

XML:

Extensible Markup Language

Introduction

The era of cellular and digital telecommunications began in the 1990s with second-generation (2G) mobile networks, based on time-division multiple access (TDMA).

In the 2000s, third-generation (3G) networks were developed on the principle of wideband code-division multiple access (WCDMA). Although the third generation has dominated the market thanks to the increase in data throughput, it has never completely replaced the second generation.

The early 2010s saw the start of fourth-generation (4G) networks using orthogonal frequency-division multiple access (OFDMA) for the downlink and single-carrier frequency-division multiple access (SC-FDMA) for the uplink.

The development of 4G networks followed three steps identified by the releases of 3GPP (3rd Generation Partnership Project) standard:

– releases 8 and 9 are the basis of LTE (Long-Term Evolution) standard;

– releases 10, 11 and 12 are the basis of LTE Advanced standard;

– releases 13 and 14 are the basis of LTE Advanced Pro standard.

The 3GPP standardization body specified service models corresponding to specific use cases and requirements:

– MBB (Mobile Broadband) service corresponds to applications and services that require faster connection, which make it possible, for example, to watch videos in ultra-high definition or use virtual or augmented reality applications;

– LLC (Low Latency Communication) service groups together all the applications requiring extremely high reactivity as well as reliability of the data transmission service, for example civil security for critical missions;

– MTC (Machine Type Communication) service mainly groups applications linked to the Internet of Things (IoT). These services do not require very high bit rates, but require more extensive coverage and lower energy consumption.

I.1. LTE standard

Release 8 defines the evolved packet system (EPS) consisting of a new evolved packet core (EPC) coupled to a new evolved universal terrestrial radio access network (E-UTRAN).

Release 8 defines a new radio interface based on orthogonal frequency-division multiplexing (OFDM) and four-channel spatial multiplexing (MIMO (Multiple Input Multiple Output) 4×4). The MIMO function relies on the availability of the cell-specific reference signal (CRS).

Category-4 mobiles are able to achieve up to 150 Mbps for the downlink and up to 50 Mbps for the uplink, with the following characteristics for the radio interface:

– a radio channel bandwidth of 20 MHz;

– 64-QAM (Quadrature Amplitude Modulation) for the downlink and 16-QAM for the uplink;

– two-channel spatial multiplexing (MIMO 2×2) for the downlink.

LTE standard only offers services based on packet-switching (PS), and as such, only allows the transport of IP (Internet Protocol) packets. In release 9, the telephone service VoLTE (Voice over LTE) is therefore provided by the network IMS (IP Multimedia Sub-system). If the VoLTE is not deployed, the mechanism CSFB (Circuit-Switched Fallback) is used to redirect the mobile to 2G/3G networks in the CS mode in the case of an incoming or outgoing telephone call.

I.2. LTE Advanced standard

Release 10 provides throughput enhancement through carrier aggregation (CA), which increases the overall bandwidth of the radio channel.

The throughput improvement is also achieved by increasing the number of channels spatially multiplexed (MIMO 8×8). Additional resources are specifically allocated to each mobile for the channel state information reference signal (CSI-RS).

The modulation scheme has been increased from 64-QAM to 256-QAM, allowing an increase in the downlink bit rate.

Release 11 introduces new features to improve data throughput and edge coverage, with enhanced inter-cell interference coordination (eICIC) and coordinated multipoint (CoMP) transmission.

Release 12 defines a new MTC architecture that takes into account connected objects. A new category of mobile (category 0) is introduced, allowing a reduced energy consumption in return for a lower data rate.

LTE Advanced standard also defines the evolved Multimedia Broadcast/Multicast Service (eMBMS) in order to broadcast content shared between multiple mobiles. In addition, in the areas of public safety and critical communications, the eMBMS network improves the efficiency of the MCPTT (Mission Critical Push-To-Talk) service that enables the transmission of voice to all participants of a group.

In addition, release 12 introduces proximity services, from device to device (D2D), to obtain a reduced latency for the time of both communication establishment and the voice transport.

I.3. LTE Advanced Pro standard

The goal of LTE Advanced Pro standard is to increase the throughput for mobiles to reach the value of Gigabit/s, to bring new functionalities to EPS, MTC and eMBMS networks, and to introduce new proximity services, namely vehicle to everything (V2X).

I.3.1.MBB service

I.3.1.1. Network architecture

The control and user plane separation (CUPS) aims to define a more flexible distributed architecture, taking advantage of the evolution towards software-defined networking (SDN) implementations.

The CUPS architecture is based on the separation between the user plane and the control plane for the serving gateway (SGW) and the PDN (Packet Data Network) gateway (PGW). This architecture enables mobile edge computing (MEC) deployments that leverage a distributed user plane, collocated with the evolved node base station (eNB), and a centralized control plane.

Dual connectivity (DC) introduced in release 12 improves the downlink throughput. IP packets are simultaneously transmitted from two eNB entities, the master eNB (MeNB) and the secondary eNB (SeNB).

Release 13 introduces the traffic transfer to two radio stations for the uplink, according to two parameters: a primary link and a threshold value. When the mobile buffer is below the threshold, the mobile only sends data on the primary link. When the amount of buffered data exceeds the threshold, the mobile can send data to both the MeNB and the SeNB.

I.3.1.2. Spatial multiplexing

A significant improvement in release 13 is the introduction of active antenna system (AAS), with antenna elements ranging from 8 to 64, which is relevant for frequencies above 3.5 GHz.

The FD-MIMO (Full-Dimension MIMO) mechanism enables beamforming in the horizontal and vertical directions and the generation of three-dimensional spatial links.

Associated with the FD-MIMO mechanism, two methods for using the CSI-RS are defined:

– for the method Class A, the CSI-RS is associated with an antenna element, their number being limited to 16;

– for the method Class B, the eNB entity can configure up to eight beams per mobile, each beam being formed from a CSI-RS.

Release 14 improves the FD-MIMO mechanism, for the method Class A, by increasing the number of CSI-RS up to 32 and decreasing the density of the CSI-RS. For the method Class B, the improvement concerns the efficiency of the CSI-RS.

I.3.1.3. Channel aggregation

Channel aggregation has increased to 32 (the number of aggregated components). In order to meet growing data traffic, LTE Advanced Pro standard has also introduced new aggregation techniques: LAA (License Assisted Access), LWA (LTE–Wi-Fi Aggregation) and LWIP (LTE/WLAN radio level integration with IPsec tunnel).

LAA is an extension of LTE aggregation. Transmission is carried out on licensed (LTE) and unlicensed frequency bands (Wi-Fi at 5 GHz U-NII band), between the mobile and the eNB entity, without an intermediate access point. The eNB entity is the anchor point for channel aggregation.

LAA is similar to dual connectivity, for which LTE transmission takes place on the MeNB station and Wi-Fi transmission on the SeNB station.

In release 13, transmission on the unlicensed frequency band occurs only for the downlink. The transmission for the uplink exists in release 14.

LWA and LWIP use LTE and Wi-Fi frequency bands. The transmission on the Wi-Fi radio channel occurs between the mobile and the access point (AP) in accordance with the 802.11 standard. The eNB entity is the anchor point for channel aggregation.

Release 14 brings the following enhancements to the LWA features:

– transmission of data for the uplink on the Wi-Fi network;

– support for new 60 GHz frequency bands and 802.11a, 802.11ad and 802.11ay interfaces;

– collection of information for available capacity on the Wi-Fi network;

– discovery of neighboring Wi-Fi networks under the coverage of eNB entities.

LWIP uses an IPSec tunnel to transport IP packets between the eNB entity and the Wi-Fi access point. Unlike LWA, LWIP aggregation does not require any modification for Wi-Fi transmission.

I.3.2.LLC service

For D2D communication, the main improvement lies in the support of relaying by mobile. This allows, for public safety, mobiles out of coverage to communicate with the network via mobiles under the radio coverage.

The SC-PTM (Single-Cell Point-To-Multipoint) feature was introduced in release 13 to improve the efficiency of the radio interface of the eMBMS network, by supporting, on one cell, the broadcast service using specific radio resources.

Prior to release 13, the 3GPP organization standardized functionality for use as an enabler for mission-critical services. For example, an MCPTT group voice call must have a bearer already established for immediate use due to the time required to establish the bearer on the eMBMS network.

Release 13 defines different application services for the MCPTT function: user authentication, group affiliation, group calls and private calls, and floor control.

Release 14 completes the MCPTT function with various management services: configuration management, group management, identity management and key management.

Release 14 introduces vehicle-to-everything (V2X) communication, which comes in four applications depending on the different types of device to which the vehicle connects:

– vehicle-to-vehicle (V2V) communication;

– vehicle-to-infrastructure (V2I) communication;

– vehicle-to-pedestrian (V2P) communication;

– vehicle-to-network (V2N) communication.

I.3.3.MTC service

Release 13 changes the architecture of the network to optimize the data transfer using different planes:

– the control plane, to reduce the number of messages during the processing of a session establishment procedure;

– the user plane, for which the management of the connection avoids deleting the context when the terminal has no longer data to transmit.

The architecture enhancements for service capability exposure (AESE) is used to expose network services and capabilities to third parties, and to provide access to network capabilities:

– high latency communication, to support the scenario in which applications communicate with temporarily inaccessible terminals;

– point-to-multipoint communication;

– increase in the discontinuous reception (DRX) cycle;

– event monitoring affecting the terminal operation.

Terminals Cat. 1 and Cat. 0 were introduced in releases 8 and 12 respectively for MTC service. These terminals have reduced functionality but can operate in a bandwidth of 20 MHz.

To reduce the complexity of the terminal and improve the battery life and radio coverage, release 13 introduces two new technologies for the radio interface:

– LTE-M operating in a bandwidth of 1.4 MHz, with terminals Cat. M1;

– NB-IoT (NarrowBand Internet of Things) operating in a bandwidth of 180 kHz, with terminals Cat. NB1.

In order to increase the throughput on the radio interface, release 14 introduces two new categories of terminals: Cat. M2 for LTE-M and Cat. NB2 for NB-IoT.

I.4. Wi-Fi integration

Release 8 defines the integration of the Wi-Fi radio access network at the EPC, addressing all aspects of interworking: mobility between Wi-Fi and LTE access and security (authentication, protection of data). However, release 8 does not allow simultaneous connections to multiple access networks. In addition, release 8 specifies the access network discovery and selection function (ANDSF).

Several access architectures connected to the EPC are defined:

– the architecture based on the S2a interface, for which the Wi-Fi radio access network is trusted and the mobility is managed by the network;

– the architecture based on the S2b interface, for which the Wi-Fi radio access network is untrusted and the mobility is managed by the network;

– the architecture based on the S2c interface, for which the mobility is managed by the mobile and the Wi-Fi radio access network can be trusted or untrusted.

Release 9 improves the ANDSF feature that provides access network discovery and selection information for roaming scenarios.

Release 10 introduces simultaneous connections to several radio access technologies.

The NSWO (Non-Seamless WLAN Offload) feature allows traffic to be directly routed to the Internet network without crossing the EPC.