Practical Guide to LTE-A, VoLTE and IoT - Ayman ElNashar - E-Book

Practical Guide to LTE-A, VoLTE and IoT E-Book

Ayman ElNashar

0,0
116,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

Essential reference providing best practice of LTE-A, VoLTE, and IoT Design/deployment/Performance and evolution towards 5G This book is a practical guide to the design, deployment, and performance of LTE-A, VoLTE/IMS and IoT. A comprehensive practical performance analysis for VoLTE is conducted based on field measurement results from live LTE networks. Also, it provides a comprehensive introduction to IoT and 5G evolutions. Practical aspects and best practice of LTE-A/IMS/VoLTE/IoT are presented. Practical aspects of LTE-Advanced features are presented. In addition, LTE/LTE-A network capacity dimensioning and analysis are demonstrated based on live LTE/LTE-A networks KPIs. A comprehensive foundation for 5G technologies is provided including massive MIMO, eMBB, URLLC, mMTC, NGCN and network slicing, cloudification, virtualization and SDN. Practical Guide to LTE-A, VoLTE and IoT: Paving the Way Towards 5G can be used as a practical comprehensive guide for best practices in LTE/LTE-A/VoLTE/IoT design, deployment, performance analysis and network architecture and dimensioning. It offers tutorial introduction on LTE-A/IoT/5G networks, enabling the reader to use this advanced book without the need to refer to more introductory texts. * Offers a complete overview of LTE and LTE-A, IMS, VoLTE and IoT and 5G * Introduces readers to IP Multimedia Subsystems (IMS)Performs a comprehensive evaluation of VoLTE/CSFB * Provides LTE/LTE-A network capacity and dimensioning * Examines IoT and 5G evolutions towards a super connected world * Introduce 3GPP NB-IoT evolution for low power wide area (LPWA) network * Provide a comprehensive introduction for 5G evolution including eMBB, URLLC, mMTC, network slicing, cloudification, virtualization, SDN and orchestration Practical Guide to LTE-A, VoLTE and IoT will appeal to all deployment and service engineers, network designers, and planning and optimization engineers working in mobile communications. Also, it is a practical guide for R&D and standardization experts to evolve the LTE/LTE-A, VoLTE and IoT towards 5G evolution.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 981

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Cover

Dedication

About the Authors

Preface

Acknowledgments

Chapter 1: LTE and LTE‐A Overview

1.1 Introduction

1.2 Link Spectrum Efficiency

1.3 LTE‐Advanced and Beyond

1.4 Evolved Packet System (EPS) Overview

1.5 Network Architecture Evolution

1.6 LTE UE Description

1.7 EPS Bearer Procedures

1.8 Access and Non‐access Stratum Procedures

1.9 LTE Air Interface

1.10 OFDM Signal Generation

1.11 LTE Channels and Procedures

1.12 Uplink Physical Channels

1.13 Physical Layer Procedures

1.14 RRC Layer and Mobility Procedures

1.15 LTE Idle Mode Mobility Procedures

1.16 LTE Connected Mode Mobility Procedures

1.17 Interworking with Other 3GPP Radio Access

References

Chapter 2: Introduction to the IP Multimedia Subsystem (IMS)

2.1 Introduction

2.2 IMS Network Description

2.3 IMS Identities and Subscription

2.4 IMS Architecture and Interfaces

2.5 MMTel (Multimedia Telephony) Services

2.6 Service Centralization and Continuity AS (SCC AS)

2.7 Operator X IMS–VoLTE Architecture

References

Chapter 3: VoLTE/CSFB Call Setup Delay and Handover Analysis

3.1 Overview

3.2 Introduction

3.3 CSFB Call Flow and Relevant KPIs

3.4 VoLTE Call Flow and Relevant KPIs

3.5 VoLTE Handover and Data Interruption Time

3.6 Single Radio Voice Call Continuity (SRVCC)

3.7 Performance Analysis

3.8 Latency Reduction During Handover

3.9 Practical Use Cases and Recommendations

3.10 Conclusions

References

Chapter 4: Comprehensive Performance Evaluation of VoLTE

4.1 Overview

4.2 Introduction

4.3 VoLTE Principles

4.4 Main VoLTE Features

4.5 Testing Environment and Main VoLTE KPIs

4.6 VoLTE Performance Evaluation

4.7 EVS Coding and Voice Evolution

4.8 TTI Bundling Performance Evaluation

4.9 BLER Impact on Voice Quality

4.10 Scheduler Performance

4.11 VoLTE KPI Evaluation

4.12 Use Cases and Recommendations

4.13 Conclusions

References

Chapter 5: Evaluation of LTE‐Advanced Features

5.1 Introduction to LTE‐Advanced Features

5.2 Carrier Aggregation in LTE‐A and LTE‐A Pro

5.3 Higher‐order Modulation (HOM) for Uplink and Downlink

5.4 LTE‐A Feature Dependencies

5.5 Other Enhancements Towards Advanced LTE Deployments

References

Chapter 6: LTE Network Capacity Analysis

6.1 Overview

6.2 Introduction

6.3 Users and Traffic Utilization

6.4 Downlink Analysis

6.5 DL KPI Analysis

6.6 UL KPI Analysis

6.7 Data Connection Performance

6.8 Link Reliability Analysis

6.9 Main KPI Comparison for Different Operators

References

Chapter 7: IoT Evolution Towards a Super‐connected World

7.1 Overview

7.2 Introduction to the IoT

7.3 IoT Standards

7.4 IoT Platform

7.5 IoT Gateways, Devices, and “Things” Management

7.6 Edge and Fog Computing

7.7 IoT Sensors

7.8 IoT Protocols

7.9 IoT Networks

7.10 3GPP Standards for IoT

7.11 3GPP NB‐IoT

7.12 NB‐IoT DL Specifications

7.13 NB‐IoT UL Specifications

7.14 Release 13 Machine‐type Communications Overview

7.15 Link Budget Analysis

7.16 NB‐IoT Network Topology

7.17 Architecture Enhancement for CIoT

7.18 Sample IoT Use Cases

References

Chapter 8: 5G Evolution Towards a Super‐connected World

8.1 Overview

8.2 Introduction

8.3 5G New Radio (NR) and Air Interface

8.4 What is Next for LTE‐A Pro Evolution?

8.5 5G Spectrum View

8.6 5G Design Considerations

8.7 5G Deployment Scenarios for Mobile Applications

8.8 Air‐to‐Ground and Satellite Scenarios

8.9 5G Evaluation KPIs

8.10 Next‐generation Radio Access Requirements

8.11 5G NextGen Core Network Architecture

8.12 5G Waveform and Multiple Access Design

8.13 NFV and SDN

8.14 Conclusion

References

Index

End User License Agreement

List of Tables

Chapter 1

Table 1.1 Spectrum efficiencies of the LTE system.

Table 1.2 IMT‐Advanced requirements.

Table 1.3 LTE‐Advanced targets versus LTE targets.

Table 1.4 Average and cell‐edge requirements.

Table 1.5 5 GHz available spectrum per region.

Table 1.6 LAA versus LWA.

Table 1.7 LTE‐FDD band allocation.

Table 1.8 LTE‐TDD band allocation.

Table 1.9 Main features of EPS entities.

Table 1.10 LTE UE categories.

Table 1.11 LTE UE categories throughput estimation.

Table 1.12 Different QCI values and corresponding service requirements.

Table 1.13 EPS identifiers.

Table 1.14 EMM procedures supported by the NAS protocol in both the UE and NW.

Table 1.15 EPS session management (ESM).

Table 1.16 Comparison between EMM and ECM states.

Table 1.17 Time domain frame arrangements.

Table 1.18 Frequency domain frame arrangements for different BW.

Table 1.19 Modulation schemes.

Table 1.32 The location of the UE‐specific search space.

Table 1.20 LTE physical layer channels.

Table 1.21 Physical cell identity.

Table 1.22 PSS and SSS.

Table 1.23 Downlink reference signals.

Table 1.24 Reference Signals total overhead for normal CP.

Table 1.25 Locations of the PBCH channel.

Table 1.26 PHICH information.

Table 1.27 Example of number of PHICH symbols in a frame (normal CP).

Table 1.28 PCFICH information.

Table 1.29 Number of OFDM symbols assigned for the PDCCH in a subframe.

Table 1.30 Different DCI values.

Table 1.31 Different RNTI format values and their usage.

Table 1.33 Uplink Reference Signal.

Table 1.34 PUCCH formats.

Table 1.35 CQI versus MCS and modulation.

Table 1.36 CQI versus MCS and modulation for 256QAM.

Table 1.37 MIMO DL TxM mode.

Table 1.38 Comparison between TM3 and TM4.

Table 1.39 LTE DL quality KPIs.

Table 1.40 DL peak TP factors for Category 4 terminals.

Table 1.41 DL peak TP factors for a Category 6 terminal.

Table 1.42 Signaling bearers (SRBs) and data bearers (DRBs).

Table 1.43 Main system information blocks.

Table 1.44 RCC release scenarios.

Table 1.45 PLMN selection order characteristics.

Table 1.46 Service type vs cell categories.

Table 1.47 Parameter descriptions for cell selection criteria.

Table 1.48 Serving and neighboring cell threshold definitions.

Table 1.49 Neighboring cell threshold definitions.

Table 1.50 Serving and neighboring cell threshold definitions.

Table 1.51 Intra‐frequency parameter tradeoffs.

Table 1.52 RLF parameters in SIB2 applying to PS data QCIs (i.e. QCI = 9).

Table 1.53 RLF parameters in Connected mode applying to VoIP QCIs (i.e. QCI = 1).

Table 1.54 Measurement configurations for different priorities.

Table 1.55 UTRAN FDD timers based on DRX cycle length.

Table 1.56 Serving and neighboring cell thresholds.

Table 1.57 Serving and neighboring cell thresholds.

Table 1.58 Serving and neighboring cell thresholds.

Chapter 2

Table 2.1 Message content of SIP basic request and SIP extended request.

Table 2.2 Message content of a SIP response message.

Table 2.3 IMS network elements (NEs) in the session control layer.

Table 2.4 Key functions of CSCF network elements (NEs).

Table 2.5 Key functions of interworking nodes' network elements (NEs).

Table 2.6 Key functions of database network elements (NEs).

Table 2.7 Key functions of IMS multimedia resources.

Table 2.8 IMS network elements (NEs) in the access and bearer layer.

Table 2.9 Functions of IMS entities of the access and bearer layer.

Table 2.10 Location and function of IMS interfaces.

Table 2.11 IMS main protocols.

Table 2.12 Diameter message explanations.

Table 2.13 Functions of different nodes during registration.

Table 2.14 The information stored during registration.

Table 2.15 The number types for fixed and mobile phones in the IMS system.

Table 2.16 Protocols of MRC interfaces.

Table 2.17 Different location parameters in the IMS network.

Table 2.18 LTE QCIs.

Table 2.19 Distribution of interconnected Network Elements (NEs).

Chapter 3

Table 3.1 CSFB deployment strategies.

Table 3.2 KPIs impacting the CSFB call setup latency.

Table 3.3 KPIs impacting VoLTE call setup latency.

Table 3.4 Recommended settings for RLF timers for QCI = 1 and QCI = 9. Ue Timer Const (SIB2 applying to all services).

Table 3.5 RLF parameters for

QCI

 = 

1

. Enable RlfTimerConstGroup (Connected mode applying to certain QCI/service).

Table 3.6 Camping on LTE after CSFB call release.

Table 3.7 C‐DRX parameters for VoLTE and PS data.

Table 3.8 Summary of Delay 1 and Delay 2 for C‐plane without PS data.

Table 3.9 Summary of U‐plane performance without PS data.

Table 3.10 Summary of UL interruption time without PS data.

Table 3.11 Factors impacting handover delay.

Table 3.12 Summary of UL interruption time with PS data.

Table 3.13 Summary of Delay 1 and Delay 2 for C‐plane with PS data.

Table 3.14 Summary of U‐plane performance with PS data.

Table 3.15 Summary of causes for higher than expected C‐plane and U‐plane delays (Table 3.20 in [3]).

Table 3.16 Handover latency components – typical values.

Chapter 4

Table 4.1 Network and VoLTE parameters.

Table 4.2 RoHC compression efficiency from field testing.

Table 4.3 DL and UL compression gain on the PS domain.

Table 4.4 Downlink scheduling and throughput comparison between VoLTE and OTT.

Table 4.5 3GPP events for improving handover.

Table 4.6 3GPP codecs.

Table 4.7 Source codec bitrates for the EVS primary modes.

Table 4.8 Source codec bitrates for the EVS AMR‐WB IO modes.

Table 4.9 Scheduler implementation comparison.

Table 4.10 Average VoLTE DL and UL PRB utilization at different LTE bands for different QCIs.

Table 4.11 Main KPIs for different LTE bands in busy hours.

Chapter 5

Table 5.1 General 3GPP requirements for TDD–FDD joint operation.

Table 5.2 Ideal and non‐ideal backhaul latency and capacity categories.

Table 5.3 Inter‐band combinations for TDD+FDD carrier aggregation.

Table 5.4 Unlicensed sub‐bands on the 5 GHz band.

Table 5.5 CQI to modulation mapping in 3GPP.

Table 5.6 Power consumption comparison between different uplink schemes – UE side.

Table 5.7 LTE UE categories and corresponding technology for each category.

Table 5.8 Breakdown of UE category support for a combination of MIMO, HOM, and CA.

Table 5.9 Impact of inter‐cell interference in LTE.

Table 5.10 Comparison between NAIC and NAICS interference cancellation.

Table 5.11 General 3GPP LTE and LTE‐A Pro feature categories.

Table 5.12 Results for uplink data RoHC trial.

Table 5.13 Encrypted traffic ratio.

Chapter 6

Table 6.1 The analyzed LTE counters.

Table 6.2 LTE network parameters.

Table 6.3 RRC connected users – average and peak values for weekdays, weekends, and overall.

Table 6.4 RRC Active users – average and peak values for weekdays, weekends, and overall.

Table 6.5 OL‐MIMO vs. CL‐ MIMO.

Table 6.6 Number of OFDM symbols for the PDCCH in a subframe.

Chapter 7

Table 7.1 Comparison between 3GPP IoT licensed technologies.

Table 7.2 Comparison between unlicensed LPWA technologies.

Table 7.3 Comparison between NB‐IoT and unlicensed LPWA networks.

Table 7.4 Comparison between 3GPP IoT technologies for LPWAN.

Table 7.5 Summary of 3GPP IoT module categories.

Table 7.6 Summary of NB‐IoT exploited technologies.

Table 7.7 UL and DL parameters of NB‐IoT.

Table 7.8 Reference signals (NB‐RS) presence.

Table 7.9 NB‐PDCCH versus LTE PDCCH.

Table 7.10 Summary of NB‐DCI Format N0/N1.

Table 7.11 Summary of NB‐DCI Format N2.

Table 7.12 NB‐PDSCH parameters.

Table 7.13 PRB indexes for different BWs.

Table 7.14 NPSS/NSSS description.

Table 7.15 NB‐IoT UL frame structure.

Table 7.16 NB‐IoT resource and modulation.

Table 7.17 MCS/TBS mapping table for multi‐tone (four bits for I

TBS

).

Table 7.18 MCS/TBS mapping table for single‐tone (four bits for I

TBS

)

Table 7.19 Comparison between NB‐IoT and LTE physical layer channels.

Table 7.20 Summary of NB‐IoT of higher layer features.

Table 7.21 Link budgets for eMTC channels and LTE Category 1 +

.

Table 7.22 Maximum coupling losses for NB‐IoT.

Table 7.23 NB‐IoT deployment parameters.

Table 7.24 Coverage analysis for NB‐IoT PUSCH.

Table 7.25 Simulation parameters.

Table 7.26 LoRa and Sigfox parameters.

Table 7.27 Link budget for Sigfox and LoRaWAN.

Table 7.28 Traffic models for cellular IoT.

Chapter 8

Table 8.1 Scalable and flexible 5G design

Table 8.2 Comparison between sub‐6 GHz and mmWave bands.

Table 8.3 5G potential technologies.

Table 8.4 Comparison between LTE at sub‐6 GHz and mmWave technologies.

Table 8.5 Modulation and coding schemes of P802.11ad ITU‐R WP 5A.

Table 8.6 5G deployment scenarios for legacy mobile clusters.

Table 8.7 5G deployment scenario for high‐speed trains.

Table 8.8 Highway, extreme rural, and urban grid for connected car deployment scenarios.

Table 8.9 Parameters for the urban coverage for massive connection deployment scenario.

Table 8.10 Air‐to‐ground deployment scenarios

Table 8.11 Examples for satellite deployment.

Table 8.12 QoS functional split between the UE, AN, CN, and the SL.

Table 8.13 Waveform requirements in decreasing order of importance per application.

Table 8.14 Candidate waveforms regarded as the most promising for 5G with CP‐OFDM used as the benchmark. (TBI = to be investigated.)

Table 8.15 5G candidate waveforms – comparative analyses.

Table 8.16 Supported loading for UL contention‐based SCMA and OFDMA.

Table 8.17 Potential functions to be virtualized.

List of Illustrations

Chapter 1

Figure 1.1 3G and 4G roadmap and evolution.

Figure 1.2 3GPP LTE releases.

Figure 1.3 Key features for LTE and LTE‐Advanced.

Figure 1.4 LTE with LAA and LWA.

Figure 1.5 VoWiFi for trusted and untrusted 3GPP networks.

Figure 1.6 Different LTE UE categories for IoT.

Figure 1.7 Main targets for 5G compared to IMT‐Advanced.

Figure 1.8 Main use cases for 5G.

Figure 1.9 FDD and TDD operation.

Figure 1.10 3G/Evolved HSPA/ LTE network topology.

Figure 1.11 LTE/EPS network topology.

Figure 1.12 Giga LTE roadmap in licensed and unlicensed bands.

Figure 1.13 EPS bearers.

Figure 1.14 Registration and attach procedure in the EPS system.

Figure 1.15 LTE radio bearer description.

Figure 1.16 EPS security basics.

Figure 1.17 QoS aspects in EPS.

Figure 1.18 LTE protocol stack overview.

Figure 1.19 EPS access and non‐access strata.

Figure 1.20 EPS identifiers.

Figure 1.21 EPS Idle and Active states.

Figure 1.22 EPS network topology.

Figure 1.23 CDMA and OFDM.

Figure 1.24 OFDMA versus SC‐FDMA.

Figure 1.25 WCDMA frame structure.

Figure 1.26 LTE‐FDD frame structure.

Figure 1.27 Physical resource block and resource element in LTE‐FDD.

Figure 1.28 Resource grid arrangements.

Figure 1.29 Downlink physical layer processing.

Figure 1.30 MIMO rank, codeword, layer, and antenna port.

Figure 1.31 Scrambling operation.

Figure 1.32 LTE channel mapping of protocol layers.

Figure 1.33 Main LTE physical channels in the DL and UL.

Figure 1.34 Reference signals for normal CP.

Figure 1.35 Frame structure for the LTE downlink.

Figure 1.36 LTE subframe with SRS and DM‐RS signals.

Figure 1.37 PUCCH control regions.

Figure 1.38 A combination of control signals and user data on the PUSCH.

Figure 1.39 Basic uplink and downlink scheduling implementations.

Figure 1.40 MIMO 2 × 2 operation.

Figure 1.41 MIMO types in LTE.

Figure 1.42 DL peak TP at differing layers for Category 4 terminals.

Figure 1.43 DL peak TP at differing layers for a Category 6 terminal.

Figure 1.44 State transitions LTE, 3G, 2G.

Figure 1.45 Comparison between RRC Idle and RRC Connected.

Figure 1.46 System information (SI) transmission.

Figure 1.47 Scheduling of system information (SI).

Figure 1.48 Paging occasion with DRX enabled.

Figure 1.49 Paging message procedure.

Figure 1.50 Initial security activation.

Figure 1.51 RRC connection reconfiguration.

Figure 1.52 RRC connection release.

Figure 1.53 DL information transfer.

Figure 1.54 UL information transfer.

Figure 1.55 UE capability transfer.

Figure 1.56 UE information.

Figure 1.57 LTE mobility procedure.

Figure 1.58 Handling reselection priorities.

Figure 1.59 Measurement rules for cell reselection.

Figure 1.60 Speed‐dependent scaling of reselection parameters.

Figure 1.61 LTE intra‐frequency cell reselection.

Figure 1.62 LTE inter‐frequency cell reselection with equal priority.

Figure 1.63 LTE inter‐frequency cell reselection with low priority.

Figure 1.64 LTE inter‐frequency cell reselection with high priority.

Figure 1.65 Measurement parameters.

Figure 1.66 DRB establishment during initial attach.

Figure 1.67 DRB establishment after initial attach.

Figure 1.68 Delay assessment during handover.

Figure 1.69 Event A3 measurement report triggering.

Figure 1.70 Intra‐frequency handover call flow.

Figure 1.71 Radio link failure and re‐establishment procedure.

Figure 1.72 E‐UTRA states and inter‐RAT mobility procedures.

Figure 1.73 E‐UTRAN to UTRAN cell reselection flow.

Figure 1.74 Cell detection and cell measurements for different DRX cycles.

Figure 1.75 LTE inter‐RAT to UTRAN cell reselection with low priority.

Figure 1.76 LTE inter‐RAT to UTRAN cell reselection with high priority.

Figure 1.77 UTRAN to E‐UTRAN cell reselection flow.

Figure 1.78 UTRAN to E‐UTRAN measurement rules.

Figure 1.79 UTRAN to E‐UTRAN measurement stages.

Figure 1.80 LTE inter‐RAT to GERAN cell reselection with low priority.

Figure 1.81 LTE inter‐RAT to GERAN cell reselection with high priority.

Figure 1.82 Event B1 measurement report triggering.

Figure 1.83 Gap measurement example.

Figure 1.84 Example of inter‐RAT handover parameters.

Figure 1.85 Inter‐RAT handover to UTRAN call flow.

Chapter 2

Figure 2.1 IMS position in the PS domain.

Figure 2.2 The protocol stack including the SIP and other related protocols.

Figure 2.3 Simplified SIP network communication.

Figure 2.4 SIP basic flow.

Figure 2.5 Initial session request.

Figure 2.6 Update request flow.

Figure 2.7 Initial response flow.

Figure 2.8 Example of media negotiation.

Figure 2.9 Reference architecture of the IP multimedia core network subsystem.

Figure 2.10 IMS architecture.

Figure 2.11 Functions of the service capability layer and the application layer.

Figure 2.12 Functions of the session control and media resources layer and the access/bearer layer.

Figure 2.13 Call session control function network elements.

Figure 2.14 Simple model for the IMS call procedure.

Figure 2.15 Interworking nodes' network elements (NEs).

Figure 2.16 Legacy network connection, Scenario.

Figure 2.17 Database function network elements (NEs).

Figure 2.18 Legacy network connection, Scenario 2.

Figure 2.19 Legacy network connection, Scenario 3.

Figure 2.20 Main functions of the HSS database.

Figure 2.21 IMS multimedia resources' network elements.

Figure 2.22 OSA services architecture.

Figure 2.23 IMS service capability layer.

Figure 2.24 IMS protocols and reference interfaces.

Figure 2.25 CSCF subscriber registration in home and visited networks.

Figure 2.26 CSCF subscriber registration function.

Figure 2.27 IMS registration procedure.

Figure 2.28 IMS registration signaling flow.

Figure 2.29 User‐initiated de‐register signaling flow.

Figure 2.30 S‐CSCF‐initiated de‐register signaling flow.

Figure 2.31 IMS discovery during default bearer attachment.

Figure 2.32 CSCF authentication function.

Figure 2.33 IMS service profile.

Figure 2.34 CSCF roaming and roaming restriction.

Figure 2.35 CSCF emergency call procedure.

Figure 2.36 S‐CSCF service trigger.

Figure 2.37 S‐CSCF media control.

Figure 2.38 VoLTE emergency call handling.

Figure 2.39 S‐CSCF number analysis description.

Figure 2.40 IMS route selection process.

Figure 2.41 Route Selection Attribute Code (RTSAC).

Figure 2.42 Route Selection Code (RTSC) process.

Figure 2.43 Route Selection Source Code (RTSSC) process.

Figure 2.44 Example of an IMS user dialing an emergency call.

Figure 2.45 CSCF topology‐hiding procedure.

Figure 2.46 DNS query request.

Figure 2.47 DNS server database.

Figure 2.48 ENUM query procedure.

Figure 2.49 ENUM DNS architecture.

Figure 2.50 DNS and ENUM functions in the IMS.

Figure 2.51 CSCF charging.

Figure 2.52 AS‐triggering‐failure scenario.

Figure 2.53 CSCF PSI service.

Figure 2.54 CSCF SIP forking.

Figure 2.55 CSCF session timer.

Figure 2.56 CSCF session timer negotiation.

Figure 2.57 Number portability service.

Figure 2.58 Network disaster tolerance.

Figure 2.59 S‐CSCF assignment.

Figure 2.60 S‐CSCF selection.

Figure 2.61 CSCF NAT keep alive procedure.

Figure 2.62 CSCF fast re‐registration.

Figure 2.63 Media bypass procedure.

Figure 2.64 The position of the MRFC in the IMS network.

Figure 2.65 Reference interfaces of the MRC.

Figure 2.66 IMS public and private identities.

Figure 2.67 The iFC set.

Figure 2.68 The SBC interfaces.

Figure 2.69 Example of RCS use case.

Figure 2.70 VoLTE in the MGW.

Figure 2.71 VoLTE–CS interworking function in the MGW.

Figure 2.72 MRF connectivity for VoLTE.

Figure 2.73 The XCAP connectivity.

Figure 2.74 LTE network layout.

Figure 2.75 LTE TFTs.

Figure 2.76 Bearer establishment.

Figure 2.77 LTE bearer model.

Figure 2.78 Rx Diameter call flow.

Figure 2.79 Operator X's IMS–VoLTE high‐level architecture.

Figure 2.80 IMS interconnection.

Figure 2.81 IMS interworking with PSTN.

Figure 2.82 IMS signaling connection to the PSTN through M2UAby the STP.

Figure 2.83 ISUP signaling stack between the MGCF and the PSTNthrough M2UA by the STP.

Figure 2.84 IMS signaling connection to the PSTN through M3UA by the SG.

Figure 2.85 SUP signaling stack between the MGCF and the PSTN through M3UA by the SG.

Figure 2.86 IMS signaling connection to the PSTN through M2UA by the IM‐MGW.

Figure 2.87 ISUP signaling stack between the MGCF and the PSTN through M2UA by the IM‐MGW.

Figure 2.88 IMS interworking with the NGN.

Figure 2.89 AS location‐mapping design.

Figure 2.90 IP‐SM‐GW and MAP Any Time Modification (ATM) operation.

Figure 2.91 IP‐SM‐GW homing.

Figure 2.92 IMS subscription for a VoLTE user.

Chapter 3

Figure 3.1 Voice evolution in 3GPP.

Figure 3.2 MO CSFB from E‐UTRAN Connected mode to UTRAN with redirection.

Figure 3.3 MO CSFB from E‐UTRAN Connected mode to UTRAN with PS handover.

Figure 3.4 EPS bearers during a VoLTE call and at call end.

Figure 3.5 VoLTE to VoLTE call setup flow with QoS‐aware devices, preconditions enabled, and network‐initiated QoS.

Figure 3.6 Handover procedure and VoLTE interruption time during handover.

Figure 3.7 RLF recovery procedure.

Figure 3.8 SRVCC standard evolution in 3GPP.

Figure 3.9 eSRVCC signaling procedure.

Figure 3.10 Handover mechanism and relevant parameters in eSRVCC.

Figure 3.11 (a) aSRVCC in the alerting phase with QCI = 1; (b) bSRVCC in the pre‐alerting phase with QCI = 1; (c) bSRVCC in the pre‐alerting phase without QCI = 1.

Figure 3.12 CSFB call setup delay performance in mobility – MO side.

Figure 3.13 VoLTE call setup delay performance – MO side.

Figure 3.14 Handover execution time up to SIB read [ms].

Figure 3.15 Call setup delay performance for VoLTE to 3G and 3G to 3G – MO side.

Figure 3.16 Handover execution time up to RRC Complete [ms].

Figure 3.17 RTP interruption [ms].

Figure 3.18 Jitter during the handover [ms].

Figure 3.19 UL data interruption [ms].

Figure 3.20 eSRVCC and LTE intra‐frequency voice interruption time.

Figure 3.21 A study of interruption time during handover for an LTE system [19].

Figure 3.22 LTE C‐plane handover delay distribution (Figure 3.37 in [3]).

Figure 3.23 LTE U‐plane interruption delay distribution during handovers (Figure 3.38 in [3]).

Figure 3.24 PS handover delay components.

Figure 3.25 Propagation delays between the UE and the source and target cells.

Figure 3.26 Average percentage of interruption time.

Figure 3.27 State transition at call setup.

Figure 3.28 SIP timeout at call setup.

Figure 3.29 The UE loses VoLTE due to an IMS registration issue.

Figure 3.30 bSRVCC collision leading to subsequent setup failure.

Figure 3.31 Call failure due to bSRVCC, even if supported.

Figure 3.32 Network planning challenges.

Figure 3.33 Impact of number of UMTS carriers on handover delay.

Figure 3.34 Average time from INVITE until 183‐Session Progress in different scenarios.

Figure 3.35 IRAT redirection during VoLTE.

Figure 3.36 No response to SIP message, leading to call drop.

Chapter 4

Figure 4.1 VoLTE bearers within the EPC/IMS.

Figure 4.2 The concept of jitter and jitter buffer management.

Figure 4.3 RoHC operation mechanism.

Figure 4.4 TTI bundling and RLC segmentation procedures.

Figure 4.5 Testing methodology summary.

Figure 4.6 Distribution of the RTP error rate under mobility conditions.

Figure 4.7 RTP DL jitter with RoHC enabled, and without and with PS data.

Figure 4.8 RTP relative jitter versus DL BLER.

Figure 4.9 Average RTP and jitter versus RSRP.

Figure 4.10 Average RTP and jitter versus RSRQ.

Figure 4.11 Average RTP and jitter versus SINR.

Figure 4.12 Possible RF optimization to improve VoLTE performance.

Figure 4.13 LTE intra‐frequency handover procedures. *Refer to [20] for more details.

Figure 4.14 RTP performance during intra‐frequency handover execution.

Figure 4.15 Voice quality measurements for different technologies (mobility)

Figure 4.16 Average VoLTE MOS values at near cell with different codec rates.

Figure 4.17 Average VoLTE MOS values at cell edges with different codec rates.

Figure 4.18 Voice quality for different VoLTEcodec rates in different RF conditions.

Figure 4.19 Non‐roaming architecture for VoWiFi.

Figure 4.20 Theoretical audio bandwidths: narrowband, wideband, super wideband, and fullband. (The actual bandwidths in use may be somewhat narrower than these; for example, for narrowband, the bandwidth is typically about 300–3400 Hz.)

Figure 4.22 EVS‐NB, WB, SWB mixed‐bandwidth test, DTX on/off, with noisy speech (car noise at 20 dB SNR) in the Finnish language.

Figure 4.21 EVS‐NB, WB, SWB mixed‐bandwidth test, DTX on, with clean speech in North American English.

Figure 4.23 EVS‐NB, WB, SWB music and mixed content, DTX on/off, in North American English.

Figure 4.24 TTI bundling impact on MOS.

Figure 4.25 PUSCH BLER, PHICH ACK rate versus DL PL condition with TTI bundling feature deployed.

Figure 4.26 Impact of BLER on voice quality.

Figure 4.27 VoLTE to CSFB overall call attempts ratio versus cell ID.

Figure 4.28 Daily RAB establishment success rate per LTE band for QCI = 1.

Figure 4.29 Daily RAB establishement success rate per LTE band for QCI = 5.

Figure 4.30 Daily drop rate per LTE band for QCI = 1.

Figure 4.31 Daily drop rate per LTE band for QCI = 5.

Figure 4.32 PS daily call drop rate per LTE band.

Figure 4.33 VoLTE DL and UL throughput demand in busy hours at different bands.

Figure 4.34 VoLTE DL and UL resource utilization at different LTE bands and in busy hours.

Figure 4.35 RRC connected users, DL traffic, number of cells, and average number of connected users versus DL user throughput.

Figure 4.36 Average number of connected users at different LTE bands on a daily basis.

Figure 4.37 CQI versus MIMO Rank 2 utilization in busy hours.

Figure 4.38 CQI versus DL throughput.

Figure 4.39 MIMO Rank 2 utilization versus DL throughput.

Chapter 5

Figure 5.1 Main LTE and LTE‐A (Pro) features.

Figure 5.2 Carrier aggregation concept.

Figure 5.3 Types of carrier aggregation.

Figure 5.4 Capacity gains of carrier aggregation.

Figure 5.5 User experience gains of carrier aggregation.

Figure 5.6 Types of TDD–FDD joint carrier aggregation.

Figure 5.7 Downlink throughput as a function of channel quality indicator.

Figure 5.8 TDD + FDD carrier aggregation coverage analysis.

Figure 5.9 Inter‐site TDD + FDD carrier aggregation with non‐ideal backhaul.

Figure 5.10 Overall LTE LAA concept.

Figure 5.11 Overall architecture for each LWA deployment scenario.

Figure 5.12 Overall protocol for each LWA deployment scenario.

Figure 5.13 Higher‐order modulation, QAM concepts.

Figure 5.14 Theoretical downlink throughput for Category 6 (64QAM) and Category 12 (256QAM).

Figure 5.15 CQI versus number of LTE connected users and downlink modulation distribution in the same network.

Figure 5.16 SINR distribution and CQI versus SINR in the same network.

Figure 5.17 Gains of 256QAM with different RF deployment strategies, compared to 64QAM only in the same network.

Figure 5.18 Uplink modulation distribution from network data for all sites.

Figure 5.19 Gain of uplink 64QAM over 16QAM and overall 64QAM utilization under different loading conditions.

Figure 5.20 Uplink throughput comparison between 64QAM and uplink carrier aggregation.

Figure 5.26 RoHC operation for VoLTE traffic.

Figure 5.21 Different scenarios for achieving close to 1 Gbps downlink throughput in LTE‐A Pro.

Figure 5.22 Expected aggregated throughput in LWA.

Figure 5.23 Categories of interference cancellation.

Figure 5.24 Uplink CoMP gains for PS data and for VoLTE.

Figure 5.25 Typical traffic type distribution by smartphone users.

Figure 5.27 Uplink and downlink traffic distribution in a live network – from network counters.

Figure 5.28 UL interference level during busy hours – from network counters.

Figure 5.29 LTE‐TDD uplink and downlink throughput measurements.

Figure 5.30 Uplink traffic volume distribution for different services.

Figure 5.31 Concept challenges in VoLTE strategy and planning.

Figure 5.32 Areas for improvement for eVoLTE in 3GPP Release 14.

Chapter 6

Figure 6.1 Relationship between user behavior, network deployment, and targeted performance.

Figure 6.2 Network phases – network deployment, initial and ongoing optimization.

Figure 6.3 Traffic behavior and performance.

Figure 6.4 Overall number of RRC Connected users.

Figure 6.5 Daily numbers of RRC Connected users.

Figure 6.6 Overall number of RRC Active users.

Figure 6.7 Daily number of RRC Active users.

Figure 6.8 DL to UL traffic ratio.

Figure 6.9 Average traffic volume per user.

Figure 6.10 TTI occupancy – DL.

Figure 6.11 TTI occupancy – UL.

Figure 6.12 Downlink analysis and performance.

Figure 6.13 Downlink throughput (Mbps).

Figure 6.14 DL bit rate per resource block.

Figure 6.15 DL throughput per active user and per connected user.

Figure 6.16 User scheduling rate versus DL user throughput.

Figure 6.17 TTI utilization versus DL cell throughput.

Figure 6.18 Carrier aggregation gain.

Figure 6.19 Mean CQI per cell.

Figure 6.20 Overall CQI distribution.

Figure 6.21 CDF daily CQI distribution.

Figure 6.22 CQI versus number of LTE users.

Figure 6.23 CQI versus traffic.

Figure 6.24 CQI versus spectral efficiency.

Figure 6.25 Overall view of modulation.

Figure 6.26 Daily view of modulation.

Figure 6.27 Mean DL MCS.

Figure 6.28 DL MCS usage for all cells.

Figure 6.29 DL BLER per MCS.

Figure 6.30 Average DL BLER per cell.

Figure 6.31 Daily RB utilization.

Figure 6.32 Overall RB utilization.

Figure 6.33 Transmit diversity versus spatial multiplexing.

Figure 6.34 OL‐MIMO versus CL‐MIMO.

Figure 6.35 SU‐MIMO versus MU‐MIMO.

Figure 6.36 Overall DL MIMO Rank 2 utilization.

Figure 6.37 Daily MIMO utilization.

Figure 6.38 Mean CQI for OL/CL‐MIMO.

Figure 6.39 Downlink traffic for OL/CL‐MIMO.

Figure 6.40 64QAM percentage share for OL/CL‐MIMO.

Figure 6.41 DL throughput for OL/CL‐MIMO.

Figure 6.42 OL/CL‐MIMO loop share.

Figure 6.43 LTE dimensioning example.

Figure 6.44 Mean CFI number of symbols used for all PDCCH.

Figure 6.45 PDCCH performance.

Figure 6.46 Maximum number of UEs scheduled on the PDCCH per TTI.

Figure 6.47 CQI adjustment.

Figure 6.48 RBG assignment for DL FSS.

Figure 6.49 Interference randomization.

Figure 6.50 Uplink analysis and performance.

Figure 6.51 Uplink cell throughput.

Figure 6.52 Uplink bit rate per resource block.

Figure 6.53 Mean UL MCS.

Figure 6.54 UL MCS usage for all cells.

Figure 6.55 UL throughput.

Figure 6.56 Overall view of modulation.

Figure 6.57 Daily view of modulation.

Figure 6.58 UL BLER per modulation scheme.

Figure 6.59 Average UL BLER for all cells.

Figure 6.60 Overall UL PRB utilization.

Figure 6.61 Daily UL PRB utilization.

Figure 6.62 Contention‐based random access versus contention‐free random access.

Figure 6.63 Random access procedure and signaling flow.

Figure 6.64 RACH type distribution.

Figure 6.65 RACH type distribution.

Figure 6.66 RACH type distribution.

Figure 6.67 Average UL interference.

Figure 6.68 UL interference versus cell UL TTI utilization.

Figure 6.69 UL interference versus cell UL PRB utilization.

Figure 6.70 Data connection performance.

Figure 6.71 General call flow.

Figure 6.72 RRC connection performance.

Figure 6.73 Number of RRC connections for connected users.

Figure 6.74 E‐RAB performance.

Figure 6.75 E‐RAB call drop rate performance.

Figure 6.76 CSFB performance.

Figure 6.77 CSFB call attempts per user.

Figure 6.78 Link reliability performance.

Figure 6.79 PDCP performance.

Figure 6.80 DL/UL discard rate.

Figure 6.81 DL PDCP packet processing delay.

Figure 6.82 DL cell throughput for different operators.

Figure 6.83 DL RB utilization for different operators.

Figure 6.84 Mean CQI for different operators.

Chapter 7

Figure 7.1 Technological and social aspects related to the IoT.

Figure 7.2 IEEE P2413 three‐tier architecture of the IoT.

Figure 7.3 IEEE P2413 IoT markets and stakeholders.

Figure 7.4 OneM2M layered architecture.

Figure 7.5 Smart city platform.

Figure 7.6 ITU definition of the IoT.

Figure 7.7 Standards‐based horizontal IoT/M2M service layer.

Figure 7.8 OneM2M simplified architecture.

Figure 7.9 Horizontal IoT topology/architecture.

Figure 7.10 IoT platform reference architecture. Reproduced by permission of Intel.

Figure 7.11 IoT deployment scenarios.

Figure 7.12 Edge computing topology. Reproduced by permission of Cisco.

Figure 7.13 Edge/fog computing GW. Reproduced by permission of Cisco.

Figure 7.14 Edge/fog computing architecture migration. Reproduced by permission of Cisco.

Figure 7.15 Edge/fog computing topology. Reproduced by permission of Cisco.

Figure 7.16 Edge/fog computing distribution. Reproduced by permission of Cisco.

Figure 7.17 Sensor ecosystem. Reproduced by permission of Libelium.

Figure 7.18 IoT sensor samples. Reproduced by permission of Libelium.

Figure 7.19 IoT sensor samples. Reproduced by permission of Libelium.

Figure 7.20 Standardized IoT protocol stack.

Figure 7.21 Protocol landscape for the IoT from device to business process.

Figure 7.22 SK Telecom's E2E IoT architecture. Reproduced by permission of Netmanias.

Figure 7.23 IoT connectivity classification.

Figure 7.24 Low‐power, wide‐area network (LPWAN) applications. Reproduced by permission of GSMA.

Figure 7.25 Generic Gartner's Hype Cycle. Reproduced by permission of Gartner.

Source

: Gartner Methodologies, Gartner Hype Cycle, http://www.gartner.com/technology/research/methodologies/hype‐cycle.jsp

Figure 7.26 Priority matrix for IoT standards and protocols. Reproduced by permission of Gartner.

Figure 7.27 New paradigm for cellular IoT.

Figure 7.28 LPWA IoT application profiling. Reproduced by permission of GSMA.

Figure 7.29 IoT market classifications.

Figure 7.30 3GPP roadmap for IoT technologies.

Figure 7.31 3GPP IoT application profiling.

Figure 7.32 NB‐IoT deployment scenarios.

Figure 7.33 Core network slicing to support NB‐IoT.

Figure 7.34 NB‐IoT Channel Mapping of Protocol Layers.

Figure 7.35 NB‐IoT numerology.

Figure 7.36 NB‐IoT HD‐FDD operation.

Figure 7.37 NB‐IoT reference signals (NB‐RS).

Figure 7.38 NB‐PBCH resource allocation.

Figure 7.39 NB‐PBCH coding chain.

Figure 7.40 NB‐PDCCH resource mapping.

Figure 7.41 NB‐PDSCH.

Figure 7.42 Example of NB‐IoT PRB for a 3 MHz carrier.

Figure 7.43 NB‐IoT carriers for a 5 MHz LTE carrier in guard band.

Figure 7.44 Unified resource mapping rules for NPSS/NSSS.

Figure 7.45 Multiple NB‐IoT carrier operation.

Figure 7.46 NB‐IoT frame structure for 15 kHz.

Figure 7.47 NB‐IoT frame structure for 3.75 kHz.

Figure 7.48 NB‐PUSCH repetitions.

Figure 7.49 Timing relationship and micro‐sleep.

Figure 7.50 UL transmission gap.

Figure 7.51 NB‐IoT DL gap.

Figure 7.52 eMTC narrow band definition.

Figure 7.53 Coverage performance for LTE, LTE‐M, and NB‐IoT.

Figure 7.54 868 MHz EU ISM band power and duty cycle restrictions.

Figure 7.58 CDF of the total downlink failure from blocking and coverage limitations. The penetration loss is 20 dB for indoor devices.

Figure 7.55 Uplink coverage relative to penetration loss with and without interference.

Figure 7.56 Downlink coverage relative to penetration loss with and without interference.

Figure 7.57 CDF of the total uplink failure from random access collision and coverage limitations. The penetration loss is 20 dB for indoor devices.

Figure 7.59 Network architecture of NB‐IoT.

Figure 7.60 Typical IoT core network including SCEF.

Figure 7.61 Network for NB‐IoT data transmission and reception.

Figure 7.62 Optimized EPS architecture option for CIoT – non‐roaming architecture.

Figure 7.63 Optimized EPS architecture option for CIoT – roaming architecture.

Figure 7.64 S1‐lite protocol stack.

Figure 7.65 Protocol stack for CIoT small data transmission – non‐roaming.

Figure 7.66 Protocol stack for CIoT small data transmission – roaming.

Figure 7.67 E2E small data flow.

Figure 7.68 CIoT architecture for non‐IP small data transmission via MTC‐IWF.

Figure 7.69 CIoT architecture for non‐IP small data transmission via the SCEF.

Figure 7.70 CIoT architecture for non‐IP small data transmission via the SCEF with minimized load to HSS.

Figure 7.71 Asset management for mobile sites.

Figure 7.72 Temperature and humidity.

Figure 7.74 Three‐phase voltage from the grid.

Figure 7.73 Power consumption.

Figure 7.75 Smart meter system.

Figure 7.76 Smart building system.

Figure 7.77 CEM dashboard example.

Chapter 8

Figure 8.1 5G and the industry driving force: an all‐in‐one system.

Figure 8.2 LTE‐A traffic and throughput correlation.

Figure 8.5 5G migration scenarios in 3GPP: non‐standalone (NSA) options.

Figure 8.4 Efficient multiplexing of different services on the same carrier.

Figure 8.3 5G NR design concepts.

Figure 8.6 5G migration scenarios in 3GPP: standalone (SA) options.

Figure 8.7 LTE‐Advanced Pro peak throughput deployment scenarios.

Figure 8.8 5G and LTE gap analysis.

Figure 8.9 Timeline for IMT‐2020 (5G) development.

Figure 8.10 3GPP timelines for 5G standardization.

Figure 8.11 5G features for Phase 1 and Phase 2.

Figure 8.12 WRC spectrum definitions.

Figure 8.13 5G use cases and applications.

Figure 8.14 5G targets compared to IMT‐Advanced

Figure 8.15 5G latency versus 4G.

Figure 8.16 Cell‐edge throughput comparison.

Figure 8.17 5G flexible frame structure concept.

Figure 8.18 Digital beamforming versus hybrid beamforming.

Figure 8.19 Comparison between the RF beamforming in 4G LTE (cmWave) and 5G (mmWave).

Figure 8.20 Massive MIMO gain.

Figure 8.21 5G potential bands and relevant design criteria.

Figure 8.22 Example MU capacity performance by different UE IC capability.

Figure 8.23 Atmospheric absorption at 60 GHz.

Figure 8.24 Channel and region allocation of unlicensed 60GHz band ITU‐R WP 5A.

Figure 8.25 IEEE 802.11ad spectrum mask.

Figure 8.26 Packet structures for each of the three modulation types.

Figure 8.27 4 GHz deployment.

Figure 8.28 30 GHz deployment.

Figure 8.29 New RAN architecture.

Figure 8.30 Non‐centralized deployment.

Figure 8.31 Co‐sited deployment with E‐UTRA.

Figure 8.32 Centralized deployment.

Figure 8.33 Shared RAN deployment.

Figure 8.34 Cell layout where NR and LTE coverage co‐exist.

Figure 8.35 CN–RAN deployment scenarios where NR gNB is a master node.

Figure 8.36Figure 8.36 CN–RAN deployment scenarios where LTE eNB is a master node.

Figure 8.37Figure 8.37 CN–RAN deployment scenarios where eNB connected to NextGen Core is a master node.

Figure 8.38 CN–RAN connection for inter‐RAT mobility between NR gNB and (e)LTE eNB.

Figure 8.39 CN–RAN connection for WLAN integration with NR.

Figure 8.40 Overall architecture.

Figure 8.41 Functional split between NG‐RAN and NGC.

Figure 8.42 Overall architecture for E‐UTRA with a NextGen Core.

Figure 8.43 QoS architecture in NR and NextGen Core.

Figure 8.44 QoS functional split including 3GPP RAN.

Figure 8.45 Reference point nomenclature.

Figure 8.46 Deployment Option 2.

Figure 8.47 Deployment Option 3.

Figure 8.48 Deployment Option 4.

Figure 8.49 Deployment Option 5.

Figure 8.50 Deployment Option 7.

Figure 8.51 5G architecture based on Option 5.

Figure 8.52 Control‐plane interfaces for network slicing with common and slice‐specific functions.

Figure 8.53 Network with

n

tenants and

m

possible slice types (with UEs which can only access a single tenant slice).

Figure 8.54 Sharing a set of common C‐plane functions among multiple core network instances.

Figure 8.55 Sharing all the C‐plane functions in a common CP function for all the core network instances.

Figure 8.56 Network slice selection based on usage class.

Figure 8.57 (a) CDF of user throughput for OMA (

m

= 1) and NOMA (

m

= 2 or 3); (b) NOMA (

m

= 2) gains in terms of cell throughput versus cell‐edge user throughput.

Figure 8.58 SCMA modulation and multiple access using non‐orthogonal multiplexing of codewords in the frequency domain. Sparsity facilitates efficient joint detection.

Figure 8.59 NFVI supports a multitude of NFV use cases and fields of application.

Figure 8.60 NFV approach.

Figure 8.61 ETSI NFV model.

Figure 8.62 ETSI evolved reference framework.

Figure 8.63 Verizon's SDN‐NFV high‐level architecture.

Figure 8.64 Management and control architecture with vCPE infrastructure.

Figure 8.65 Multi‐tenant converged common computing architecture.

Figure 8.66 Detailed architecture for a multi‐tenant approach.

Guide

Cover

Table of Contents

Begin Reading

Pages

C1

xvii

xix

xx

xxi

1

2

3

4

5

6

7

8

9

10

12

13

14

15

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

328

329

330

331

332

327

333

335

336

338

340

341

342

344

345

346

347

348

349

350

351

353

354

355

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

393

394

395

396

397

399

400

401

402

403

405

404

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

426

427

428

429

430

431

432

433

434

435

436

437

438

439

440

441

442

443

445

446

447

448

449

450

451

452

453

454

455

456

457

458

Practical Guide to LTE-A, VoLTE and IoT

Paving the Way Towards 5G

Ayman Elnashar

Emirates Integrated Telecommunications Company (EITC) Dubai Media City Dubai UAE

 

Mohamed El-saidny

MediaTek Dubai Internet City Dubai UAE

Copyright

This edition first published 2018

© 2018 John Wiley & Sons Ltd.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.

The right of Ayman Elnashar and Mohamed El-saidny to be identified as the authors of this work has been asserted in accordance with law.

Registered Offices

John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA

John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK

Editorial Office

The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK

For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.

Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that appears in standard print versions of this book may not be available in other formats.

Limit of Liability/Disclaimer of Warranty

While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

Library of Congress Cataloging-in-Publication Data applied for

Hardback ISBN: 9781119063308

Cover design by Wiley

Cover image: © jamesteohart/Shutterstock

Dedication

This book is dedicated to the memory of my parents (God bless their souls). They gave me the strong foundation and unconditional love, which remains the source of motivation and is the guiding light of my life.

To my dearest wife, my pillar of strength, your encouragement and patience has strengthened me always.

To my beloved children Noursin, Amira, Yousef, and Yasmina. You are the inspiration!

I want to offer my sincerest appreciation to the innovation and vision of UAE. It has provided me with a fulfilling career, an unmatched lifestyle and the inspiration to author this book.

-Ayman Elnashar, PhD

I would like to dedicate this book to my amazing family for their continuous support and encouragement. To my beloved wife, you have guided and inspired me throughout the years. To my beautiful daughter, you always surprise me with your motivational spirit and hard work.

“The scientific man does not aim at an immediate result. He does not expect that his advanced ideas will be readily taken up. His work is like that of the planter-for the future. His duty is to lay the foundation for those who are to come, and point the way”. - Nikola Tesla

Mohamed El-saidny

About the Authors

Ayman Elnashar, PhD, has 20+ years of experience in telecoms industry including 2G/3G/LTE/WiFi/IoT/5G. He was part of three major start‐up telecom operators in the MENA region (Orange/Egypt, Mobily/KSA, and du/UAE). Currently, he is Head of Infrastructure Planning: ICT and Cloud with the Emirates Integrated Telecommunications Co. “du”, UAE. He is the founder of the Terminal Innovation Lab and UAE 5G innovation Gate (U5GIG). Prior to this, he was Sr. Director – Wireless Networks, Terminals and IoT where he managed and directed the evolution, evaluation, and introduction of du wireless networks including LTE/LTE‐A, HSPA+, WiFi, NB‐IoT and is currently working towards deploying 5G network in UAE.

Prior to this, he was with Mobily, Saudi Arabia, from June 2005 to Jan 2008, as Head of Projects. He played key role in contributing to the success of the mobile broadband network of Mobily/KSA. From March 2000 to June 2005, he was with Orange Egypt.

He published 30+ papers in the wireless communications arena in highly ranked journals and international conferences. He is the author of Design, Deployment, and Performance of 4G‐LTE Networks: A Practical Approach published by Wiley & Sons, and Simplified Robust Adaptive Detection and Beamforming for Wireless Communications to be published in May 2018.

His research interests include practical performance analysis, planning and optimization of wireless networks (3G/4G/WiFi/IoT/5G), digital signal processing for wireless communications, multiuser detection, smart antennas, massive MIMO, and robust adaptive detection and beamforming.

Mohamed El‐saidny, M.Sc., is a leading technical expert in wireless communication systems for modem chipsets and network design. He established and managed the Carrier Engineering Services Business Unit at MediaTek, the department responsible for product business development and strategy alignment with network operators and direct customers. He has 15+ years of technical, analytical and business experience, with an international working experience in the United States, Europe, Middle East, Africa, and South‐East Asia markets.

Mohamed is the inventor of numerous patents in CDMA and OFDM systems and the co‐author of Design, Deployment and Performance of 4G‐LTE Networks: A Practical Approach book by Wiley & Sons. He published several international research papers in IEEE Communications Magazine, IEEE Vehicular Technology Magazine, other IEEE Transactions, in addition to contributions to 3GPP specifications.

Preface

This book is a practical guide to the design, deployment, and performance of LTE‐A, VoLTE/IMS and IoT. A comprehensive practical performance analysis for VoLTE is conducted based on field measurement results from live LTE networks. Also, it provides a comprehensive introduction to IoT, 3GPP NB‐IoT and 5G evolutions. Practical aspects and best practice of LTE‐A/IMS/VoLTE/IoT, plus LTE‐Advanced features such as Carrier Aggregation (CA), are presented. In addition, LTE/LTE‐A network capacity dimensioning and analysis are demonstrated based on live LTE/LTE‐A networks KPIs. A comprehensive foundation for 5G technologies is provided including massive MIMO, eMBB, URLLC, mMTC, NGCN and network slicing, cloudification, virtualization and SDN.

Chapter 1 provides an overview of LTE/LTE‐A networks. This chapter is the foundation for the chapters 2 to 6. In Chapter 2, we will introduce the IP Multimedia Subsystem (IMS), which is the core network of Voice over LTE (VoLTE) and other advanced voice evolutions. The IMS architecture, core network elements, call and signaling flow between different network elements are comprehensively presented. The chapter provides the foundation for VoLTE performance analysis highlighted in chapter 3 and chapter 4. Other IMS services such as Voice over Wi‐Fi (VoWiFi), Video over LTE (ViLTE), and Web Real‐Time, Communication (WebRTC) are not discussed in detail. In addition, practical deployment scenarios for IMS‐network‐based on real use cases from a live network deployment are presented.

Chapter 3 presents practical performance analysis including an end‐to‐end assessment of call setup delay in different radio conditions, main challenges impacting the in‐call performance, and performance aspects of Single Radio Voice Call Continuity (SRVCC) and its evolution releases. Therefore, Chapter 3 provides comprehensive analysis for call setup delay including CSFB and VoLTE with different scenarios (stationary and mobility), and handover analysis including SRVCC in terms of data interruption time. Finally, recent topics in handover performance and data interruption reduction during handover are presented. Synchronized handover is introduced as a potential solution to reduce data interruption time during handover.

Chapter 4 presents comprehensive practical analysis of VoLTE performance based on commercially deployed 3GPP Release 10 LTE networks. The analysis in chapter 4 demonstrates VoLTE performance in terms of RTP error rate, RTP jitter and delays, BLER, and VoLTE voice quality in terms of MOS. In Chapter 4, we will also evaluate key VoLTE features such as RoHC, TTI bundling, and SPS.

Chapter 5 analyzes the new features in LTE‐A including carrier aggregation (CA), LAA, downlink 256QAM, uplink 64QAM modulation, uplink data compression (UDC), and eVoLTE.

Chapter 6 evaluates LTE counters collected for a commercially deployed 3GPP Release 10 LTE network. The analysis in this chapter includes LTE users (connected and active), LTE scheduling, LTE traffic downlink/uplink, TTI utilizations, physical resource block utilization, modulation and codec scheme, channel quality indicator (CQI), MIMO, and CSFB performance.

Chapter 7 will cover the evolution of the Internet of Things (IoT) from different aspects. The aim is to provide the reader with a holistic overview of IoT evolution and a guide on how to build, design, and customize a successful IoT use case from all perspectives including technical and commercial aspects. We will focus on 3GPP cellular IoT evolution for connectivity, i.e., narrowband IoT (NB‐IoT). However, we will initially summarize the IoT evolution from an end‐to‐end perspective, including the IoT platform, IoT protocols, connectivity, and sensors layer. The IoT evolution is different from the regular mobile evolution; the latter is focusing on connectivity only, while IoT evolution should be addressed from an end‐to‐end prospective. This is because the IoT connectivity is only 5% to 10% of the IoT value chain and therefore, the service provider should offer an end‐to‐end use case. We will present in this chapter practical IoT use cases along with dashboards to demonstrate the value of IoT.

Chapter 8 will provide a comprehensive introduction to 5G access and core networks. Advanced 5G technologies such as massive MIMO, 5G flexible frame design, URLLC, mMTC, NGCN and network slicing are also presented. Finally, virtualization and software defined network are summarized along with service provider roadmap for converged native cloud.

Acknowledgments

Many people volunteered their time and talent to make this project a reality, and we thank each and every one of them for their invaluable support. We acknowledge the huge contribution of Mohamed Yehia from du for chapters two and six. We also appreciate the support of Mohanad ElSakka from du for reviewing chapters two and six. We acknowledge the support of our colleagues at du from different sections for providing feedback, practical results and conducting testing scenarios. Without their support, this book could not be produced with such practical scenarios from live network. du is a vibrant and multiple award‐winning telecommunications service provider in UAE, serving nine million individual customers with its mobile, fixed line, broadband Internet, and Home services. du also caters to over 100,000 UAE businesses with its vast range of ICT solutions. Finally, we would like to thank the organizations that provided permission for use of their copyrighted material which significantly improved the presentation of this book.

1LTE and LTE‐A Overview

1.1 Introduction

Cellular mobile networks have been evolving for many years. As the smartphone market has expanded significantly in recent years and is expected to grow more in the years to come, network evolution needs to keep up with the pace of users' demands. This chapter provides an overview for network operators and interested others on the evolution of cellular networks, with particular focus on 3GPP for the main technologies of WCDMA/UMTS and LTE. In addition, it highlights the interaction of 3GPP with non‐3GPP technology (i.e. Wi‐Fi).