Documente Academic
Documente Profesional
Documente Cultură
Issue 1.1
1
1
System Architecture
Physical Layer structure and coding
Physical Channel functionality
Control of channel data rates
Radio link reliability
Radio Resource connection
Mobility Management and handovers
Security
Services and session establishment
Services
Increased capacity
Efficient and flexible use of radio spectrum
Competitive pricing
Data transfer and protocol efficiency
LTE Features
EGPRS
WCDMA
HSPA
HSPA+
LTE 2x2
LTE 4x2
14 Mbps
42 Mbps
150 Mbps
300 Mbps
LTE reuses the higher layer functional blocks from the 2G and 3G core
networks.
In LTE 2x2 relates to MIMO operation with 2 antennas at the base station
(eNodeB) and 2 antennas in the mobile.
The lower layers provide higher data rates than previously, rates up to
300Mbps downlink and 75Mbps uplink are indicated with the highest class
mobile and using multiple antennas at the base station and mobile.
LTE also offers greater efficiency in the use of the available spectrum (3 or 4
times DL and 2 or 3 times better UL). The instantaneous data rate can be
changed as the input data rate varies (eg web browsing) or to give the user a
specific Quality of Service. Several services may be multiplexed onto a single
connection.
Reduced latency (< 5ms one way in user plane) for user data is important for
speech circuits but also for data transfer at high speeds on poor channels
where repetitions of data are required.
The mobile does still fallback to an Idle mode, but the transition to Active is fast
(<100ms) so classed as Always on. This is important for instant messaging,
push to talk PoC and the Presence services
Mobile Categories
Category Modulation Modulation
UL
DL
Architecture
MIMO
DL
1x2
MGW
IMS
(IP Multimedia
Sub-system)
Peak Rate
DL/UL
MGCF
PSTN
P/I/S-CSCF
IP Net
10/5 Mbps
SGi
2
3
4
5
QPSK
16QAM
64QAM
QPSK
16QAM
50/25 Mbps
2x2
EPC
(Evolved
Packet Core)
150/50 Mbps
QPSK
16QAM
64QAM
4x2
S2
WLAN
100/50 Mbps
PDN
Gateway
Rx+
S7
PCRF
S5/S8
Serving
Gateway
S11
MME
S6
HSS
300/75 Mbps
S1
E-UTRAN
eNodeB
X2
eNodeB
8
E-UTRAN
PDN-Gateway
MME
UE IP address allocation
Routing of data packets
EPC
NAS Security
Mobility (Idle mode)
Serving Gateway
Mobility Anchoring
eNodeB
E-UTRAN
RRC
PDCP
RLC
MAC
PHY
eNodeB
X2
eNodeB
10
10
eNodeB Architecture
eNodeB Functionality
eNodeB
RRC
X2
PDCP
RLC
MAC
Layer 2
Header compression, encryption and integrity check
PHY
Layer 1
Modulation and Coding, RF transmission / reception
11
12
11
12
Authentication
S7
PCRF
S5
Serving
Gateway
S11
MME
S6
HSS
13
14
13
14
Database storing
Serving Gateway
Routes user data to the appropriate eNodeB as the
mobile moves
Routing to an SGSN for 2G/3G access
15
16
The Serving Gateway and PDN Gateway may be implemented in one node.
Alternatively, the Serving Gateway could be joined with the MME.
Identities for the mobile include the IMSI, Mobile Subscriber ISDN number
(MSISDN)
If the mobile roams to a different network, the Serving gateway (that is linked
with the local eNodeB) will communicate with the PDN Gateway for the
mobiles registered network. Also the local MME will have to communicate with
the HSS of the mobiles registered network to obtain security details (for
authentication and ciphering control).
The PDN Gateway also performs packet filtering, inspection packets for
viruses.
15
16
MGW
MGW
MGCF
PSTN
P/I/S-CSCF
IP Net
MGCF
PSTN
S-CSCF
IP Net
Home Network
I-CSCF
Visited Network
P-CSCF
HSS
17
18
17
18
Media Gateway
Media conversion
Bearer control
Translation of the AMR Codec data (within IP packets)
to 64kbps PCM for the telephone network
20
19
20
Video
E-mail
Web Browser
Telephone
AT Commands
Application
Mobile
Terminal
(MT)
Mobile Terminal
NAS
RRC
PDCP
RLC
Terminal Equipment
SIM
MAC
PHY
21
22
21
22
Serving
Gateway
S1
S5
SGi
Packet Routing
Appl
S1
eNodeB
Compression PDCP
Ciphering PDCP
E-UTRAN
ARQ RLC
HARQ MAC
Appl
IP
IP
PDCP
PDCP
GTP
GTP
GTP
GTP
RLC
RLC
UDP
UDP
UDP
UDP
MAC
MAC
IP
IP
IP
IP
PHY
PHY
L2/L1
UE
IP
eNodeB
L2/L1 L2/L1
Serving GW
IP
L2
L2
L1
L1
L2/L1
PDN GW
23
Application
Server
24
GTP - GPRS tunnelling Protocol, transfer of the data between the two nodes
and manages routing for a mobile that is moving between different eNodeBs
The retransmissions are performed by RLC and MAC again located in the
eNodeB to reduce any latency related to repetition of the data. Also it reduces
the about of buffering.
23
24
Protocol Structure
(NAS)
User Plane
Air Interface
S1
NAS
RRC
RRC
NAS
ROHC
Ciphering
SI
Paging
ROHC
Ciphering
RRC
Ciphering
Integrity
Radio Bearers
RRC
SCTP
SCTP
PDCP
PDCP
RLC
RLC
IP
IP
MAC
MAC
L2
L2
PHY
PHY
L1
L1
UE
PDCP
Control Plane
eNodeB
RLC
ARQ
ARQ
BCCH
PCCH
ARQ
Logical Channels
MAC
HARQ
PHY
Channel
Coding
HARQ
Transport Channels
Channel
Coding
Channel
Coding
Channel
Coding
MME
25
26
Physical Channels
Note
ROHC is robust header compression performed on the IP packet
headers in PDCP
Ciphering performed in PDCP
25
26
Channel Types
RLC
Logical Channels
MAC
Transport Channels
Physical layer
PHY
Physical Channels
Radio Link
27
28
27
27
28
29
30
29
30
31
32
31
31
32
Downlink OFDMA
Modulation
frequency
OFDM symbols
Data bits
Uplink SC-FDMA
Demux
Modulation
Modulation
C
Modulation (QAM)
A
frequency
33
Frequency translation
34
33
34
Resource block
Resource element
0
OFDM symbols (in a time slot)
35
36
The spectrum is represented by a sin (x) / x or sinc function and the frequency
bandwidth of each sub-carrier is determined by the inverse of the symbol rate the inverse of 15kHz being 66.67 s.
(Symbols are the data symbols that will be modulated using QPSK, 16-QAM or
64-QAM modulation. The more complex the modulation scheme, the more
data bits transmitted in parallel, but the symbol rate is fixed. IF QAM is used,
the amplitude of the subcarriers will also vary.
This orthogonality ensures very good spectral efficiency. The overall
bandwidth is nearly fully used without the need for large guard frequency
bands. The receiver can equalise the received subcarriers to compensate for
variable attenuation across the frequency band.
35
36
FDD
Frequency division duplex
Uplink and downlink on different
frequencies
TDD
Time division duplex
Uplink and downlink on same
frequency
Combined FDD/TDD
Uplink and downlink on different
frequencies
37
38
FDD - frequency division duplex - uses paired spectrum, in other words two
blocks of allocated frequency, a fixed distance apart. Uplink (mobile to network)
and downlink (network to mobile) signals use different frequencies. This makes
FDD mode suitable for sustained transmission of data in both directions, at
high speeds, such as encoded voice transmission.
(For clarity, reference (pilot) symbols and other details are not shown)
TDD - time division duplex - uses unpaired spectrum. Uplink and downlink
signals use the same frequency, where each block is used for either uplink or
downlink transmission. Because the block usage in TDD mode is weighted
towards downlink data, this makes TDD mode suitable for asymmetric
applications, such as web browsing.
For TDD operation, the stations require time synchronisation to ensure that
signals from different sources do not overlap in time and hence interfere.
37
38
Frame Structures
Multipath Interference
17
18
19
Slot = 0.5ms
Sub-frame = 2 slots
Time delay = T
Subframe = 1ms
Half frame
Time delay = T + t1
39
40
For TDD operation, there are various formats for downlink, uplink and the
special subframe allocations.
39
40
Data
Last part of the data is copied to the start to form the Cyclic Prefix
41
42
42
The size of the cyclic prefix may be variable. The standard length is about 5 s
which will allow for a difference in multipath lengths up to 1.5km (CP is longer
than the value t1 which was the difference in path delays on the multipath
illustration on the previous slide)
There is also provision for an extended cyclic prefix length (16.67s) to cope
with larger cells (hence longer delays with differences up to 10km) and
broadcast of MBMS channels from more than one cell to large groups of
mobiles.
Addition of a CP is preferable to simply having a guard time between OFDMA
symbols since it makes the symbol appear periodic. This periodic nature
allows for a discrete Fourier spectrum which is simpler to implement in the
transmitter and receiver.
41
42
Downlink Transmission
Scalable Bandwidth
Channel Bandwidth
(5 MHz)
Transmission Bandwidth Configuration
(25 Resource Blocks)
Resource Block
(180kHz)
CF
43
44
An optional 7.5 kHz spacing is considered for MBMS broadcast services since
this gives an even longer symbol length and is more robust for transmissions
over the entire cell to large groups of mobiles.
Channel Bandwidth
Resource Blocks
1.4
5 10 15
20
6 15 25 50 75 110
43
44
Resource block
[12] Sub-carriers in the
resource block (180 kHz)
Time delay = T
Time delay = T + t2
Resource element
45
46
For the normal cyclic prefix and type 1 frame structure there are 12 subcarriers
and 7 symbols in the resource block. If the extended CP is used this changes
to 6 symbols.
Elements of this Virtual Resource Block (containing information to be sent to
one mobile) will be distributed over a larger frequency range to form the real
Resource Block for transmission. Moreover, the distribution may be semi-static
or dynamic - changing every subframe to increase randomness and strengthen
the transmission against frequency dependant interference.
45
46
Resource block
FEC Encoding
Rate Matching
24 Sub-carriers in the
resource block (180 kHz)
Transport blocks
Scrambling
Resource element
Modulation
Resource
mapping
Antenna
mapping
47
48
For the Multimedia Broadcast over Single Frequency Network, the sub carrier
spacing is reduced to 7.5kHz and the symbols increase proportionally. This
allows for a longer cyclic prefix and hence larger multipath delays (equating to
a difference in path length of 10km).
The checksum (CRC) of 24 bits is added by the physical later but is used by
RLC to determine blocks that need to be retransmitted.
With the extended cyclic prefix and type 1 frame structure there are 24
subcarriers and 3 symbols in the resource block.
If the Transport block is larger than the Codeblock size (6144 bits) it is
segmented and an additional 24 bit CRC is added to each segment.
48
CRC Attachment
Transport Block
CRC
CRC
[24] bit CRC added
Code Block
Code Block
CRC CRC
50
Multiple stop and wait channels avoids stalling, waiting for an Ack for one
specific burst
With Incremental redundancy, the repeated signals have different parity bits
which makes the decoding more efficient than with the simpler Chase
combining schemes where the repeated signals are identical. Requirements for
processing and memory are greater with this scheme, however (not
inconsequential at these high data rates).
In addition, the modulation, resource block allocation and duration of the
transmissions may be varied in the repetition. Details would be included in the
repeated signals.
49
50
Hybrid-ARQ Example
Data
Data
Data
Ack
Data
Ack
Ack
Downlink scheme
Uplink scheme
Synchronous: a scheduled time for repetitions of data
Non-adaptive: no change in the format / content of the
repeated data packets
Chase Combining is used
52
51
In this method, each transmitted block is numbered and the user data has
redundant bits and a checksum added.
In the receiver, the blocks are decoded and the received checksum is
compared to a calculated checksum. The receiver tells the transmitter which
blocks have been received correctly or incorrectly and the transmitter re-sends
any lost blocks.
Uplink - the system is similar to that adopted for HSUPA and reduces the need
for a lot of processing and storage of differently redundant data packets in the
mobile. The use of scheduled transmissions reduces the requirement for
further downlink signalling to control the uplink transmissions (the HARQ
channel process number can be derived from the subframe number used)
51
52
Data 2
Data 3
Data 4
Data 2b
X
Ack
Nack
Ack
54
53
54
Modulation
QPSK, 16 QAM, 64 QAM
Coding
Traffic and Paging 1/3 rate (0.33) Turbo coding
Rate matching adjusts the overall rate (0.08 to 0.93)
Broadcast channel 1/3 rate tail biting convolutional
CQI
Modulation
QPSK
0.076
0.15
QPSK
0.3
0.6
QPSK
0.59
0.9
16 QAM
0.37
1.5
16 QAM
0.6
2.4
10
64 QAM
0.45
2.7
13
64 QAM
0.75
4.5
15
64 QAM
0.93
5.6
55
56
The mobile transmits the CQI value on the PUCCH and the eNodeB then uses
this to determine the modulation and coding rate to be used for downlink
transmissions. The efficiency increases as the CQI value.
55
56
Modulation Schemes
Q
(-1,1)
Q
000011
(1,1)
0001
0011
0000
0010
I
(-1,-1)
(1,-1)
I
I
57
58
The first two modulation schemes are QPSK and 16 QAM. If the channel
conditions are good, 16-QAM is used to increase the data rate since 4 bits are
sent in parallel. This modulation scheme is less tolerant of poor channels and
changes in received power since it includes a a power as well as a phase
aspect to the modulation.
The most complex scheme is 64QAM where 6 bits are sent in parallel. This
modulation scheme is less tolerant of poor channels and changes in received
power since it has a large power dependency as well as a phase aspect to the
modulation. Hence it would be applicable to a static mobile close to the base
station.
It is optional in the uplink direction.
57
58
1 TTI
Channel quality
UE2
UE1
Scheduling of data
transmission depends on
(instantaneous) channel
quality reported by UE
Transmission when
conditions are most
favourable
UE2
Time
UE1
UE2
60
59
60
Downlink MIMO
Transmitter
eNodeB
1x1 SISO
Transmitter
Receiver
1x2 SIMO
Transmitter
Receiver
2x1 MISO
Transmit Diversity
Transmitter
Receiver
2x2 MIMO
Spatial Multiplexing
Transmitter
Receiver
Receive Diversity
Receiver
T
Mobile
2 or 4 antennas at eNodeB
61
1 or 2 antennas at mobile
62
MISO uses Space Frequency Block Coding to provide transmit diversity where
data is copied onto different frequencies on the two antennas. This is used for
most of the physical channels but not the SCH and reference signals. These
are received by a single antenna in order to improve signal reception over the
channel thus combating the effects of multi-path and fading. MISO does not
increase data rates.
The terms are expressed from the viewpoint of the channel over which the
radio signals are sent, hence
SIMO - single input multiple output (ie 1 antenna transmitting into the ether and
2 antennas receiving the output from the ether)
MIMO relies on Spatial Multiplexing where two data streams are sent via 2 or 4
antennas. This is used on PDSCH and PMCH. Pre-defined orthogonal training
sequences are used from each transmitter to enable the receiver to learn to
distinguish the separate signals.
Additionally, Cyclic Delay Diversity may be used on the physical downlink
shared channel PDSCH in which there is a cyclical shift of the signal between
the different antennas. These appear as a phase diversity (a delay of half a
symbol for the 2 antenna case) in the received signal so may be separated
more easily. MIMO increases the data throughput.
If 4 antennas are used at the eNode B, there are two data streams and
transmit diversity is used for each of these on the second pair of antennas to
increase the reliability of transmission.
61
62
Capacity
MIMO
SIMO
MISO
Number of antennas
63
64
For SIMO and MISO benefits are seen on poor channel conditions in a
reduction of retransmission of data and hence increased overall throughput.
63
64
Uplink Transmission
65
66
65
65
66
Uplink Symbols
Resource element
Downlink
Uplink
Sub-carriers
Resource block
[12] Sub-carriers in the
resource block (180 kHz)
67
68
The example is for a type 1 frame structure and normal cyclic prefix. If the
extended cyclic prefix is used, there are 6 symbols per time slot.
Since the amplitude of the subcariier (frequency) is constant over the FDMA
symbol period, the scheme still receives the benefits of tolerance to spread of
time delays caused by multipath. A cyclic prefix is used at the start of each
symbol as with the downlink scheme so allowing for multipath time delay
differences.
The number of sub-symbols within an SC-FDMA symbol depends on the
number of subcarriers allocated to mobile for the uplink transmission.
67
68
Sub-carriers
A
frequency
Mobile B allocation
69
70
69
70
Power Control
71
72
72
71
72
0, +1, +3 dB)
74
In closed loop operation, the modulation and coding scheme may change the
modulation type. Each modulation type has a related default value for the
power offset.
In the uplink, transmissions from the mobiles are adjusted so that all of the
signals from the mobiles are received at the same power level. If this were not
performed, a mobile close to the base station would drown out signals from
mobiles that were further away.
73
74
Closed-Loop Control
Transmit power level is determined by information
fed back from the receiver
High Tx power
Reference Signals
measured
Low Tx power
75
76
For uplink channels this scheme would provide a very fast response to the
changing channel conditions, but problems occur since a different frequency is
used in uplink and downlink (with FDD) and the path loss may vary in the two
directions. (Open loop control is employed well in TDD since the same
frequency is used for uplink and downlink.)
Thus, in FDD mode, open loop power control is used for RACH channels. The
mobile will measure the received downlink power level and use this value to
determine the power level for the initial transmission. The random access
procedure will then increase the level if no response is received - as described
in a later section.
75
76
Antennas
16 QAM
64 QAM
64 QAM
64 QAM
SISO
SISO
MIMO 2x2
MIMO 4x2
D/L Mbps
100
150
302
U/L Mbps
51
75
Mobile 1
Node B
Mobile 2
Mobile
77
78
Single user MIMO on the uplink may not be specified since it would require two
transmit stages (as well as 2 antennas) in the mobile which could be prohibitive
in terms of cost, size and battery life. Furthermore, uplink data rates are not
usually required to be as high as those in the downlink.
When the eNodeB selects the mobiles, it will chose those for which the
received signals are uncorrelated and hence more readily separated. Accurate
power control will be important to ensure the signals are received at the same
level by the eNodeB.
77
78
PBCH
SCH
79
80
79
79
80
Synchronisation Channels
Reference Signals
Primary SCH
Signal correlates to 1 of 3 cell identity sequences
Provides subframe timing and frequency references
Secondary SCH
Identifies 1 of 168 cell identity groups
Provides frame synchronisation
82
81
82
Data Sub-carriers
Reference sub-carriers
Data
Resource block
Second reference symbol
Guard sub-carriers
DC Sub-carrier
(Centre frequency)
83
Frequency
84
The central sub carrier on the downlink is not transmitted to aid identification of
the centre of the band in initial cell search.
83
84
Modulation QPSK
86
85
86
Resource Allocation
Mobile Identity
Resource Block
Assignment
CRC
PDCCH
Resource
Blocks
Timeslot 0
PDSCH
Timeslot 1
87
88
The CRC is scrambled with the mobile identity, hence the mobile will only
deem the resource block assignment as a valid packet if the CRC matches that
for the addressed identity.
The direct bitmap is only used for up to 10 resource blocks (10 bits) otherwise
the bitmap size would become too large.
Assignments are usually made which cover transmissions in both halves of the
subframe, but it is also possible to have separate assignments for each half of
the subframe.
87
88
Mobile Identities
90
The grant in FDD mode relates to the uplink sub frame which is 4 sub frames
delayed from that in which the resource allocation is included to allow the
mobile time to process the information. In TDD the delay is different.
89
90
Resource Blocks
Modulation QPSK
PDCCH
PDSCH
Timeslot 0
Modulation QPSK
PDCCH
Timeslot 1
91
92
91
92
7.5 kHz
carrier spacing
94
93
94
P-SCH
S-SCH
Timeslot 0 and 5
Initial Acquisition
PBCH
PDCCH
PDSCH
Even Timeslots
Timeslot 1
Timeslot 0
Timeslot 1
95
96
The SCH only occupies the central 62 subcarriers within the channel
bandwidth. There are 5 unused subcarriers on either side of the SCH (as a
guard) such that the total allocation is 6 resource blocks.
The PBCH occupies the central 72 subcarriers.
Up to 3 symbols may be assigned for the PDCCH and this is repeated every
subframe (every other timeslot).
4 symbols are allocated for the PBCH, but this is shared with the reference
signals which take precedence over all other channels
95
96
97
DMRS
SRS
98
97
97
98
99
100
99
100
101
102
Uplink Control Information (UCI) includes control signalling that is always sent
with the uplink data such as Transport Format Indications, new data indications
and MIMO parameters.
101
102
PUSCH
Every Timeslot
Timeslot 0
Timeslot 1
103
104
Note that the mobile is usually only given a small number of resource blocks
within the total channel bandwidth and only for a limited time period (number of
TTIs)
Initially, the time delay between the base station and the mobile is not known
accurately, so the PRACH transmissions are not synchronised. Subsequently,
the timebase at the mobile is adjusted and the transmissions are synchronised
with uplink transmissions from other mobiles in the cell.
There are several preamble sequences defined for a cell, the mobile selects
one randomly and this is used to identify the mobile in the response sent from
the base station.
103
104
Random Access
Network
UE
17
18
19
Sequence
RRC message
RRC message
105
106
Cyclic prefix as before improves the reception of the signal and acts as a guard
time to ensure that bursts from different mobiles, (with different timing
references) do not collide. A typical CP length is 103us corresponding to a the
distance from the eNodeB of 2x15 km.
105
106
Resource Allocation
Network
UE
PRACH
on PDCCH
PRACH Preamble
Message
PUSCH
PDSCH
Power
PDCCH
Resource Blocks
RAR
RAR provides uplink grant
for RRC message
Resource Block
Assignment
CRC
Time
RRC message
N Retransmissions max
RA-RNTI
107
Downlink Sub-frames
Uplink Sub-frames
108
The mobile sends the initial PRACH preamble at a power level determined
from the downlink power (Open loop power control). The access slot and
preamble signature are chosen randomly from the allowed set.
System Information Block 2 specifies the resources reserved for the PRACH
transmissions. The resource may be specified as 1, 2, 3, 5, ... sub-frames
within the frame (the set of options depending on frame type and PRACH
preamble type). Initially this will be 6 contiguous resource blocks but additional
frequencies could be specified once all the time resource has been allocated.
Upon reception of the timing and resource allocation message on PDCCH, the
mobile can be sure that the PRACH has been correctly received. It then may
transmit the required message on the PUSCH (eg a scheduling request).
107
108
Timing Advance
Near
Uplink received symbol
Transport Channels
eNodeB symbol
Far
Uplink received symbol
109
110
110
For a mobile at some distance from the eNodeB, the timing of symbol is
delayed by the time for the radio signal to travel the distance. When the mobile
transmits, the same delay is encountered so the signal received by the eNodeB
is not where it is expected.
Hence, the mobile is requested to advance its timebase by this amount so that
signals from all mobiles in the cell are received at the eNodeB synchronous to
its timebase.
The timing advance can be up to 0.67ms a distance of 100km and with a
granularity of 0.52 s which is less than the Cyclic Prefix (4.7s)
Timing Advance updates may be sent to the mobile after this to allow for the
mobile driving around the cell.
109
110
BCH
Broadcast Channel
PCH
Paging Channel
RACH
MCH
Multicast Channel
112
Transport channels define how the data is transferred between the mobile and
the eNodeB, for example error protection, channel coding and CRC, data
packet size. This information is described by the Transport Format.
UL-SCH
dynamic link adaption used (modulation, coding and power control
schemes)
support for dynamic and semi-static (repeating) resource allocations.
RACH
111
112
BCCH
PCCH
CCCH
DTCH
MTCH
DCCH
MCCH
113
114
113
114
Channel Mapping
Logical Channels
BCCH
Transport Channels
PCCH
CCCH
DCCH
DTCH
MCCH MTCH
RACH
MAC layer
Physical Channels
PBCH
PRACH
115
116
116
Broadcast Channel
Paging Channel
Downlink Shared Channel
Multicast Channel
Uplink Shared Channel
Random Access Channel
BCCH
PCCH
CCCH
DCCH
MCCH
DTCH
MTCH
116
MAC Layer
Transport Blocks
117
118
Data is sent from the physical layer to the MAC layer in the form of transport
channels. The MAC layer is responsible for mapping the transport channels
onto logical channels and transmitting the data up to the RLC layer, and the
reverse - receiving data on logical channels from the RLC layer and mapping
that data onto transport channels for the physical layer. On those channels,
MAC layer is also responsible for segmenting long messages from higher
layers into blocks, and reassembling blocks from the physical layer into
messages for the higher layers.
MAC layer is also responsible for selecting the transport formats used on the
transport channels, and distinguishing between different UEs using the
common channels.
117
118
MAC
R/R/E/LCID
subheader
1 TTI (1ms)
MAC Header
MAC Control
Element
MAC SDU
Multiple PDUs
from several
Logical Channels
MAC SDU
Pad
MAC PDU
Physical
Layer
119
120
Every TTI (1ms) a set of Transport Blocks is transferred from the MAC to the
Physical layer. The data will be coded and split into blocks to be sent out every
10ms radio frame.
#
Multiple sub headers may be included, each one is used to define details for
each MAC SDU within the payload
Data from MAC could be sent in a single large Transport Block or in a set of
smaller Transport Blocks. The latter approach allows the number of blocks
(and hence the data rate) to be varied more simply in each TTI.
119
120
E/T/RAPID
Subheader
E/T/RAPID
Subheader
Random Access Response
to several mobiles
RLC layer
MAC Header
MAC RAR
MAC RAR
MAC RAR
Pad
MAC PDU
121
122
122
#
The MAC Random Access Response can convey a response to several
mobiles.
Multiple sub headers may be included, each one is used to define details for
each MAC Random Access Response within the payload
BI is an optional Backoff Indicator (so the mobile will perform an Aloha
backoff and repeat the Random Access after a random delay
E - Extension (subheaders to follow)
T - Type Backoff or Random Access Response
(R is reserved)
RAPID - is the Random Access Preamble ID
MAC Random Access Response includes
Timing Advance Command
Uplink Grant
Temporary C-RNTI
121
122
RLC Layer
Transparent Mode
123
124
Data is passed from RLC to MAC layer and back on logical channels. The RLC
layer reassembles data to, and segments data from, the higher layers (e.g.
RRC or PDCP).
In 3G, transparent mode was used for CS speech, but here it is never used for
user data.
123
124
Unacknowledged Mode
PDCP
RLC Tm SAP
RLC entity
Transmission buffer
MAC
125
126
No segmentation or concatenation.
No header added.
125
126
Acknowledged Mode
PDCP
RLC Um SAP
RLC entity
Transmission buffer
Reassemble
Segmentation /
concatenation
Receive buffer
HARQ reordering
MAC
127
128
The unacknowledged mode RLC entity, shown here, is more complex than the
transparent mode entity.
127
128
Am SAP
RLC entity
Transmission buffer
RLC Control
[Status PDU]
packet 1
D/C RF
Retransmission
buffer and mgt
packet 3
SDU Reassembly
Repeated packets
(Resegmented)
Segmentation / concatenation
packet 2
FI
SN
LI
LI
end
whole
start
RLC header
Repeated packets
Tx Acknowledgements
Demultiplex / routing
Logical channels
129
Data
D/C
RF
FI
Framing Info (1st and last data are segmented parts of SDUs)
SN
LI
Length Indicator for each data segment section (the last segment
length can be deduced from the total PDU length)
130
The entity takes data as RLC SDUs from higher layers, then segments or
concatenates them to form payload units (PUs). The size of the payload unit is
defined by the MAC layer on a dynamic. The entity takes the PUs and adds an
RLC header to them, to make RLC PDUs.
The AM RLC entity also takes care of status information for acknowledgement
or negative ack of a PDU.
When data is transmitted using acknowledged mode RLC, the rule is that the
entity transmits a certain number of blocks of data, then waits for an
acknowledgement from the receiver. If blocks were not received, those blocks
are repeated using the ARQ mechanism. So, when an RLC PDU is received
which contains a control message, that information is passed to the
retransmission buffer for checking against its own records.
129
130
ARQ Mechanism
RLC Data (SN=0)
SOstart
SOend
Transmitter sends
numbered blocks
NACK_SN
D/C
CPT
ACK_SN
NACK_SN
SOstart
SOend
NACK_SN
X
X
Transmitter resends
missing blocks
131
132
Extension bits which indicate the presence of optional fields are not shown
above.
Some blocks may be lost in the air, or may arrive corrupted (so the receiver
cannot decode them), due to interference.
The Status message ACK_SN is used to tell the transmitter that all blocks have
been received and the next expected sequence number
By defining the first and last bytes of the negatively acknowledged AMD PDU,
it permits the repeated data to be differently segmented depending on the
length of data to be repeated (and the instantaneous size required by MAC)..
This process can be repeated, until all the blocks have been received and
acknowledged correctly. To stop the process repeating infinitely, the network
can impose a limit to the number of retransmissions, or a time limit - any blocks
not acknowledged when the limit is reached are lost forever.
131
132
PDCP layer
133
134
133
133
134
PDCP Processing
User Plane
Serving
Gateway
Packet routing
PDCP
NAS
User Plane
IP Packet
Header
RRC
PDCP
Compression
Integrity
Ciphering
Ciphering
PDCP PDU
RLC
Control Plane
SN
IP data
RRC Message
Compression
Integrity
Ciphering
Ciphering
Ciphered data
SN
Ciphered data
MAC-I
RLC
RLC
RLC
135
136
In the User Plane, ciphering is optional (network dependant), but in the control
plane, both integrity checking and ciphering are mandatory.
As indicated in the diagram, the packet headers may be longer than the IP data
so great efficiency improvements are made by compression of the redundant
parts of this header information
The PDCP header includes the Sequence Number (SN) for re-ordering of
received data where the mobile is moving between cells
In the Control Plane the Integrity check process adds a Message
Authentication Check (secure checksum), MAC-I
Note that unlike UTRAN, PDCP is used to process RRC and NAS signalling
since PDCP performs integrity checking and ciphering
135
136
Application
PDCP Tx
RTP packet
(40 bytes)
PDCP Rx
RTP packet
(40 bytes)
Compressed
(6 bytes)
Ack
137
RTP packet
(40 bytes)
RTP packet
(40 bytes)
138
137
138
Integrity Protection
Generation of MAC-I
IK (from Authentication)
COUNT
(increments)
Message
Direction
(UL / DL)
Algorithm
MAC-I
(Inserted in PDU)
Fresh
(Random)
139
140
NAS messages and most RRC messages include the Integrity protection in
order to protect the signalling communication from spoofing. This is where an
unauthorised person transmits (malicious) messages the mobile or network in
order to disrupt the communication or the entire network.
139
140
Ciphering
CK
COUNT
Scrambling
Generator
CK
COUNT
Pseudo
random
Scrambling
Generator
Pseudo
random
Data
Layer 3
Data
Secure data
over air
141
142
142
141
142
RRC layer
143
143
144
143
144
RRC States
System Information
RRC Connected
RRC Connection
(Request from Mobile,
Response to Paging)
RRC disconnection
(End of service,
Timeout - inactivity)
RRC Idle
145
146
145
146
System Information
Network
UE
80ms
[160ms ]
SIB 2
[320ms]
SIB 3 + SIB 4
SIB 1
SIB 1
System Information
Messages
Repetition rate
40ms
[640ms]
SIB 5
[640ms]
SIB 6 + SIB 7
147
148
The Master Information Block appears just as a BCH message in Anite logs
with no specific message name.
Small System Information blocks such as 3 and 4 are combined and sent in as
single System Information message.
147
148
RRC Procedures
149
150
149
149
150
UE
Network
RA preamble assignment
(Reserved Preamble sequence)
RRC message
(C-RNTI)
UE
RRC message
(Contention Resolution by C-RNTI)
151
152
The preamble includes a 5 bit random identity used to uniquely identify the
transmitting mobile. The preamble sequence is chosen randomly from the set
broadcasted on the BCH beacon channel.
Used when the mobile already has an RRC connection for Handovers
and resuming downlink transmissions. The mobile is pre-assigned a
preamble sequence so that the random access exchange is reliable.
152
UE
RRC Connection
Logical connection established by UE
EPS Bearer
SRB 1 established
(for RRC signalling)
RRC Connection
Setup Complete
153
154
The Random Access Response provides the mobile with a temporary C-RNTI,
a temporary identity that is used for signalling identification and addressing for
the following messages.
Within the RRC Connection Request, the establishment cause may be (MO
Signalling, MO Data, ...)
There can be several radio bearers per radio connection. Each radio bearer
may support a different application. Each radio bearer can have different
properties, depending on the type of application using that radio bearer, and
the quality of service settings (which may depend on the user's tariff with the
network). A radio bearer is always established by the network.
The RRC Connection Setup message provides the mobile with the Signalling
Radio Bearer SRB 1. This is used for RRC signalling and also may be used for
NAS signalling before Security is set up, thereafter NAS signalling is sent using
SRB 2. This is sent on the PDCCH and addressed to the temp C-RNTI that
was provided to the mobile in the Random Access Response.
For SRB 1, the RLC configuration and the logical channels parameters are
specified (though default values may be set).
153
154
156
155
156
Network
UE
RRC Connection
Reconfiguration Complete
158
For the Radio Bearers, parameters are set for PDCP (eg header compression)
and RLC (eg ack/unack/transparent mode, polling and retransmission options.
In addition there is configuration of measurement reporting, MAC and Physical
layer parameters
For SRB 2, the RLC configuration and the logical channels parameters
are specified (though default values may be set).
157
158
UE
Network
UE
No response
sent from UE
RRC connection
reestablishment complete
159
160
159
160
UE capability Enquiry
Network
UE
Mobile in
connected mode
162
162
Registration (Attach)
Assignment of the Default EPS Bearer and IP address
Periodic Updating
Authentication
163
164
163
163
164
MM and RR States
MM
LTE Idle
MM
Inactivity
Fast
transition
UE
MM
Registration
LTE Active
RRC Connection
LTE Detached
Attach Request
Traffic
RRC Idle
Network
Network
eNodeB
De-register
RRC Connected
De-registration or
lack of periodic update
Attach Accept
Attach Complete
Default EPS
Bearer
165
166
The protocol may vary, NAS messages may be carried by different RRC
messages and some protocols such as Identity and UE Capability exchange
may be included.
The mobile is given a default EPS bearer during registration as part of the
always on facility.
LTE Idle - mobile is registered but not active with traffic. The network knows
the mobile position to Tracking Area. Change to LTE active can be performed
very quickly and any EPS bearers that had been established are maintained so
there is no exchange of session parameters (inc QoS parameters).
The attach procedure includes authentication of the mobile by the network and
of the network by the mobile - this is described in detail in later slides
Attach Accept provides the mobile with a (new) GUTI (globally unique
temporary identity) and this identity is used preferentially for all subsequent
communication within this tracking area. The mobile may alternatively be given
an m_tmsi. The Attach Accept may also include a Tracking Area List - a set of
TAs that the mobile is registered with.
LTE Active - mobile is exchanging traffic data and so has an RRC connection.
A default radio bearer is established and provided to the mobile in the Activate
Default EPS Bearer Context Request message which is encapsulated in the
Attach Accept to permit the always on connectivity. This default radio bearer is
allocated to the mobile for the duration of its connection. Also, the mobile is
given an IP address to permit access to the external IP network or IMS domain.
165
166
GUTI Reallocation
Network
Network
MME
Periodic update of
the temporary identity
May also provide a
new Tracking Area
Identity list
Network
Network
MME
UE
UE
Random Access procedure
Detach Request
167
168
This is equivalent of the TMSI reallocation which most network perform every
24 hours to maintain security by issuing the mobile with a new Globally Unique
Temporary Identity.
The message may also make changes to the list of Tracking Areas to which
the mobile belongs
167
168
Tracking Areas
Tracking Area
eNodeB
MME
MME
HSS
MME
Tracking Area
169
170
169
170
P/I/S-CSCF
Network
Network
MME
IP Net
UE
Random Access Procedure
EPC
PDN
Gateway
Serving
Gateway
MME
Signalling is to the
new Tracking Area
HSS
Serving
Gateway
MME
Authentication
Security
eNodeB
eNodeB
eNodeB
Old TA
New TA
TA Update Accept
(new S-TMSI)
May contain a
Tracking Area List
TA Update Complete
171
172
Control plane signalling for the move to the new Tracking Area is handled by
the MME. Authentication and security functions will be restarted with the new
MME and a new GUTI will be allocated as the identity in the TA. Signalling
may also include an update to the TA list for the mobile (but since the mobile
may be registered in several TAs, the list may not need to be changed. The
HSS is informed of the mobiles change in location
Within the EPC additional communication is performed between the old and the
new Serving gateway and MME
The PDN Gateway is updated with the new Serving Gateway (new TA) and a
new Bearer is created for the mobile to new Serving Gateway (for the always
on connection)
The IMSI and subscription information is sent to the new MME
User Plane data is passed to the new serving gateway since the routing has
been changed.
The HSS database is sent the mobiles new serving MME and IP address
171
172
Handovers
173
174
173
173
174
Handover
P/I/S-CSCF
old
eNodeB
IP Net
Handover decision,
resource allocation
by network
PDN
Gateway
EPC
Serving
Gateway
S1
eNodeB
Old cell
Data forwarded to
new eNodeB
MME
Data Packets
forwarded via
X2
Data transfer
continues
eNodeB
new
eNodeB
UE
Measurement Reports
175
176
New Cell
If the eNodeBs are in the same network and Tracking Area they can use the
X2 interface to transfer information about the active connection for efficiency.
175
176
P/I/S-CSCF
EPC
Handover to 3G
PDN
Gateway
Serving
Gateway
new
NodeB
UE
Handover decision,
resource allocation
by network
HSS
Serving
Gateway
MME
old
eNodeB
IP Net
Data forwarded to
(new) SGSN
MME
Handover Command
X2
Data transfer
continues
eNodeB
eNodeB
Old TA
New TA
177
178
Here the eNodeBs are in different Tracking Areas and linked to different
MMEs. Hence, the two MMEs communicate (via the S10 interface) to transfer
information between the two eNodeBs
If there is an X2 interface between the two eNodeBs user data may be
forwarded to the new station.
The PDN Gateway is also informed of the new routing - for user plane data to
the new Serving Gateway.
Following the handover, the mobile would initiate a TA Update and the HSS
would be informed of the new location of the mobile.
177
178
Security
E-UTRAN (PDCP)
Ciphering and Integrity for RRC signalling
Ciphering for user plane data (and SIP signalling)
Security keys
Produced during the authentication exchange
Different security keys used for each process
179
179
180
179
180
UE
K
USIM/AuC
Initiation by first
NAS message
CK/IK
Attach Request
Mobile/HSS
Authentication Request
(RAND, AUTN)
Verifies RES
Authentication Response
(RES)
KASME
Verification of AUTN
Generate RES
Mobile/MME
KNAS enc
KNAS int
Ke NB
Generate Ciphering
and Integrity Keys
Mobile/eNodeB
KUP enc
181
KRRC enc
KRRC int
182
AUTN is the authentication token used by the mobile SIM to authenticate the
network
KASME and Ke NB are intermediate keys derived from this during the
Authentication and Key Agreement
KNAS enc and NAS int are used for ciphering and integrity checking of NAS
messages
KRRC enc and RRC int are used for ciphering and integrity checking of RRC
messages
KUP enc is used for ciphering of User Plane data
181
182
Security Mode
Network
Network
MME
NAS Messages
NAS
Authentication
KNAS int
Integrity
KNAS enc
Encryption
Encapsulation
KRRC int
Integrity
KRRC enc
Encryption
User Plane
Data
RRC messages
PDCP
UE
Encryption
183
184
UEA2 and UIA2, the ciphering and integrity algorithms recently defined as
alternatives in 3G will be used in LTE. AES will also be used.
The KSI (ASME) in the Security Mode command defines the NAS keys to be
used in the selected security algorithms. There are separate keys and also
integrity check parameters for NAS and PDCP security. So NAS COUNT for
ciphering and Integrity checking at NAS level, etc
Most NAS messages are protected by security, the exceptions are the very
early messages exchanged before security is activated.
IDENTITY REQUEST /RESPONSE (if identification is IMSI);
AUTHENTICATION REQUEST/RESPONSE;
DETACH REQUEST;
DETACH ACCEPT (for non switch off);
Integrity and Ciphering algorithms and keys are also derived for use in PDCP
for the security processes that are implemented there.
183
184
185
186
185
185
186
UE
Attach Request
(PDN Connectivity Request)
Attach Accept
(Activate Default EPS
Bearer Context Request)
Attach Complete
(Activate Default EPS
Bearer Context Accept)
187
188
If the PDN Connectivity request message is within the NAS Attach Request,
the following EPS Session Management messages will also be within the
Attach messages. Alternatively, all may be separate.
For each EPS bearer there exists a single Quality of Service policy (set of
parameters). So if several service Data Flows exist over the EPS bearer, they
will all adopt the same scheduling algorithm, priority, RLC configuration etc.
The Default EPS bearer provides the mobile with an always on bearer to the
PDN gateway. It may be used for any traffic where a dedicated bearer is not
supplied - however it is not given a guaranteed minimum bit rate and no
admission control.
187
188
UE
UE
May originate from UE
RRC Connection
Reconfiguration Complete
189
190
The Dedicated EPS bearer provides the mobile with the bearer identity, a traffic
flow template (TFT), the Quality of Service parameters and a linked EPS
bearer identity for the default EPS bearer.
The procedure may be requested by the mobile in which case the reference to
the EPS bearer and traffic flow template are included in the message.
There is also a Modify EPS bearer context request / accept procedure
(These are NAS layer messages so would be encapsulated in a specific RRC
message or the general Information Transfer message.)
189
190
QCI
Guaranteed
Bit rate
Prio
rity
Delay
GBR
GBR
Service
100
10-2
Conversational speech
150
10-3
Conversational video
50
10-3
Live gaming
Non-conversational video (streaming)
GBR
300
10-6
N-GBR
100
10-6
IMS signalling
300
10-6
GBR
PER
ms
N-GBR
N-GBR
100
10-3
N-GBR
300
10-6
N-GBR
300
10-6
191
192
Some of the services are identical, the differences in the QoS is the guarantee
of bit rate and the overall service priority which is used to control the
scheduling prioritisation in the eNodeB
191
192
UE
Random Access Preamble
Random Access Response
RRC Connection Request
Session Establishment
RRC Connection
Idle to Active Mode
Service Request for
user data or signalling
193
194
193
EPS allows the mobile to be always on so there are two methods for session
establishment depending on whether the mobile has an active radio bearer.
The service request procedure is initiated by the mobile to indicate that it has
user data or signalling to transfer.
A Service Request message initiates the procedure in the case that the
mobile does not have an active Radio Bearer and causes a transition
from the idle to active state.
The sequence is applicable for any type of service (speech call, data transfer,
web browsing).
Within the Core network, the EPS bearers and their associated QoS are
preserved even whilst the mobile is Idle, but these radio bearers still have to be
communicated to the mobile once more. This reduces the number and size of
messages required and the time to establish the session (always on).
Specifically, the RRC Connection Setup message is very small compared with
the equivalent in 3G.
193
194
Authentication Request
Network
RRC Connection Reconfiguration
Mutual Authentication
SRB 2 established
RRC Connection
Reconfiguration Complete
Authentication Response
Security Mode Command
UE
RRC Connection
Reconfiguration Complete
195
196
The KSI (ASME) in the Security Mode command defines the NAS keys to be
used in the selected security algorithms.
If required, additional EPS bearers may be created with any newly requested
QoS settings following this procedure.
Integrity and Ciphering algorithms and keys are also derived for use in PDCP
for the security processes that are implemented there.
The (NAS) Activate dedicated EPS Bearer Context Request is carried by the
RRC Connection Reconfiguration message
The (NAS) Activate dedicated EPS Bearer Context Accept is carried by an
uplink information transfer message (or maybe in the RRC Connection
Reconfiguration Complete)
195
196
UE
UE
Paging
Service Request in
response to Paging
RRC Connection
Reconfiguration Complete
(Activate Dedicated EPS
Bearer Context Accept)
Service Activation
continues as before
197
198
Paging message sent on PCCH. DRX and use of paging groups is similar to
3G.
If the mobile is already in the active state, this simpler procedure is used to
start the service (speech call, data transfer, web browsing).
The Paging message is sent on all cells in the Tracking Area to which the
mobile is registered.
A Random Access procedure may be required to update timing etc if after long
DRX gap.
Note that there is no requirement to perform the Authentication process.
Within the Core network, the EPS bearers and their associated QoS are
preserved even whilst the mobile is Idle, but these radio bearers still have to be
communicated to the mobile once more. This reduces the number and size of
messages required and the time to establish the session (always on).
Specifically, the RRC Connection Reconfiguration message is very small
compared with the equivalent in 3G.
197
198
Services
Services
IMS
MGW
MGCF
PSTN
P/I/S-CSCF
IP Net
199
200
199
199
200
IMS
P/I/S-CSCF
EPC
PDN
Gateway
Signalling
P/I/S-CSCF
Media data
Serving
Gateway
eNodeB
PDN
Gateway
MME
Serving
Gateway
MME
eNodeB
201
202
201
202
Speech Coding
Security in IMS
12.2 kbps
23.85 kbps
10.2 kbps
19.85 kbps
7.95 kbps
18.25 kbps
7.4 kbps
15.85 kbps
6.7 kbps
14.25 kbps
5.9 kbps
12.65 kbps
5.15 kbps
8.85 kbps
Lowest Quality
4.75 kbps
6.6 kbps
Silence Indicator
1.8 kbps
1.75 kbps
Highest Quality
203
204
203
204
UE
Network
RRC Connection and
Bearer establishment
Register
(User identity)
Set of codecs
Invite
Sub-set of codecs
401 Unauthorized
(RAND, AUTN)
UE
Verification of AUTN
Generate RES
Verifies RES
Register
(RES)
200 OK
Change of media
or codec
Update
200 OK
Generate Integrity
Key
180 Ringing
205
206
Registration links the mobiles SIP URI (Uniform Resource Identifier) to the IP
address.
The authentication uses an IMS specific key (rather than the K parameter from
the USIM) combined with the IMS private identity.
The message lists a set of media codecs (for voice or video) supported by the
mobile.
183 Session progress is the SDP response and is used to negotiate a
supported subset of the media codecs declared in the Invite
PRACK is the provisional acknowledgement which may take a different route
now the parties have exchanged addresses details. This contains the chosen
codec.
200 is the standard OK acknowledgement
Ringing is the equivalent of Alerting.
Bye is used to tear down the session at the end.
205
206
If the broadcast is made in more than one cell, the transmissions are
synchronised to allow the mobiles to soft combine the signals from several
cells to increase the received quality.
Access discipline would include ensuring that two people do not push the
pressel and transmit simultaneously. It could also include rules for queuing of
requests, priority weighting of the users in the call, round robin type access,
blocking of new additions to the set of users, etc.
Not real time so QoS can permit more latency and jitter
Group Management Service is used to predefine groups of users so that PoC
sessions can be setup quickly
Presence Service is used to determine which users of the above group are
currently involved in the session.
207
208
PoC signalling
Presence
Network
UE a
UE b
Service
Which services are accessible (PoC, instant
messaging, ...)
Device
Physical device and connectivity for each service
210
209
210
Reference Material
Specifications
E-UTRA/E-UTRAN description
TS 36.300
Non-Access Stratum
TS 24.301
TS 36.331
TS 36.323
TS 36.322
TS 36.321
TS 36.213
TS 36.212
TS 36.211
211
212
211
212
Abbreviations
ARQ
PUSCH
AS
Access Stratum
QAM
BCCH
QCI
BCH
Broadcast Channel
QoS
Quality of Service
CMC
RA-RNTI
CP
Cyclic Prefix
RAC
C-RNTI
Cell RNTI
RACH
CQI
RB
Radio Bearer
CRC
RLC
CSG
RNC
DCCH
RNTI
DRB
ROHC
DTCH
RRC
ECM
RRM
EMM
RU
Resource Unit
eNB
E-UTRAN NodeB
S-GW
Serving Gateway
EPC
S1-MME
EPS
SC-RNTI
E-UTRA
Evolved UTRA
SI
System Information
E-UTRAN
Evolved UTRAN
SIB
FDD
SI-RNTI
FDM
S1-U
HARQ
Hybrid ARQ
SAE
LTE
SAP
MAC
MBMS
SC-FDMA
Access
MCCH
MCE
MCH
Multicast Channel
MCS
MIB
MIMO
MME
MTCH
NAS
Non-Access Stratum
OFDM
OFDMA
P-GW
PDN Gateway
P-RNTI
Paging RNTI
PAPR
PBCH
PCCH
PCFICH
PCH
Paging Channel
PCI
PDCCH
PDSCH
PDCP
PDU
PHICH
PHY
Physical layer
PLMN
PMCH
PRACH
PRB
PUCCH
SCH
The End
214
214
Synchronization Channel
SDF
SDU
SFN
SR
Scheduling Request
SRB
SU
Scheduling Unit
TA
Tracking Area
TB
Transport Block
TCP
TDD
TFT
TM
Transparent Mode
TNL
TTI
UE
User Equipment
UL
Uplink
UM
Un-acknowledge Mode
UMTS
U-plane
User plane
UTRA
UTRAN
UpPTS
VRB
X2-C
X2-Control plane
X2-U
X2-User plane
213
214