Documente Academic
Documente Profesional
Documente Cultură
What happens when a LTE UE is powered on? From PHY Layer Point of view & NAS Point of
view?
2) Explain attach procedure in LTE?
3) Why there is two types of security in LTE?
AS(Access Startum security)between eNB and UE and NAS security between UE and MME
So there is no BSC or RNC thats why two type of security
4) What are the measurement events in LTE?
Ans:
Intra/Inter Frequency Events:
Event A1 (Serving becomes better than threshold)
Event A2 (Serving becomes worse than threshold)
Event A3 (Neighbour becomes offset better than PCell)
Event A4 (Neighbour becomes better than threshold)
Event A5 (PCell becomes worse than threshold1 and neighbour becomes better than threshold2)
Event A6 (Neighbour becomes offset better than SCell)
Inter RAT Events:
Event B1 (Inter RAT neighbour becomes better than threshold)
Event B2 (PCell becomes worse than threshold1 and inter RAT neighbour becomes better than
threshold2)
5) What is DCI?
The PDCCH carries Downlink Control Information or DCI to indicate the resource assignment in UL
or DL for one RNTI.
6) What are the contents of DCI?
7) What are the main difference between DCI0 and DCI1a?
8) What is contention resolution?
9) When Radio Link Failure is detected?
Ans:
Radio link failure to be detected:
1) upon T310 expiry
2) upon random access problem indication from MAC while neither T300, T301, T304 nor
T311 is running
3) upon indication from RLC that the maximum number of re-transmissions has been reached
10) What is SRS used for?
Ans: UL reference signal used to measure the channel quality over a section of the bandwidth.
Node B use this information for frequency selective scheduling and link adaptation decisions.
11) What is DMRS/DRS?
There are 3 types of LTE scheduling used like Persistent, Semi- Persistent and
Dynamic. Every scheduling has its own important based on type of data transmission. I
mean sometimes data bur sty in nature or less bur sty.
Depend on your application these scheduling algorithms are used. Normally Dynamic
scheduling is used, In which when UE need to send data it send SR(Scheduling
request) to Enodeb and then ENodeb allocates resources to UE and inform through
DCI(Downlink Control information) over PDCCH channel. If I talk about VoLTE, voice
packet size if less but comes at regular interval. so to avoid every time Scheduling
Request towards EnodeB, which is a overhead since packets come at regular interval,
EnodeB while setting up bearer with qci 1 (which is used for Voice) also perform SPS
config towards UE. So In this way Enodeb reduces signalling overhead.
In case of semi persistent scheduling, eNB can assign predefined chunk of radio
resources for VoIP users with interval of 20ms. Therefore, UE is not required to request
resources each TTI, saving control plan overhead. This scheduling is semi-persistent in
the sense that eNB can change the resource allocation type or location if required for
link adaptation or other factors.
The difference between persistant and semipersistant is in 1st one resources are allocated
for voice permanently while in semi persistant there may be NACK so for retransmission
the resource are allocated accordingly
Ans: In LTE, without Discontinuous Reception (DRX), the UE has to be awake all the
time in order to decode downlink data, as the data in the downlink may arrive at any
time. This means that UE has to be monitoring PDCCH in every subframe in order to
check if there is downlink data available. This consumes a lot of the user equipments
power
DRX in LTE is introduced to improve UE battery lifetime. In DRX, UE discontinuously
receives PDCCH. This post discusses LTE Connected mode DRX.
The eNodeB configures DRX with a set of DRX parameters. These DRX parameters are
selected based on the application type such that power and resource savings are
maximized.
When DRX is enabled, there may be an extended delay in receiving data as, the UE
may be in DRX Sleep state at the time of data arrival at the eNodeB, and the eNodeB
would have to wait until the UE becomes ON. So the DRX parameters have to be
carefully selected such that the packet delay is minimized and power saving is
maximized.
During DRX mode, the UE powers down most of its circuitry when there are no packets
to be received. During this time UE listens to the downlink (DL) occasionally which is
called DRX Active state whereas the time during which UE doesnt listen PDCCH is
called DRX Sleep state
DRX is also beneficial to the eNodeB. Without DRX, the UE would be transmitting
periodic CSI or SRS very frequently (based on the configuration). With DRX, during OFF
periods, the UE is not allowed to transmit Periodic CSI or SRS, so the eNodeB can
assign these resources to the other UEs to maximize resource utilization.
15) Why PHICH configuration is mentioned in MIB?
Ans: PHICH Info consist of phich-Duration & phich-Resource which comes in MIB.
1.
This is the down link physical channel which is used to send the ACK/NACK for
the uplink data coming from UE..
2.
When UE sends any data then ENODEB uses this PHICH resource to send
acknowledgement for the uplink data.
3.
As MIB is most frequently transferred so it is part of this as far as i guess.
16) In what are the scenario RACH is triggered
Step 1: Msg1
Now UE also needs to give its own identity to the network so that network can address it in
next step. The identity which UE will use is called RA-RNTI (Random access radio
network temporary identity). Basically its not some value sent by UE but interestingly RA RNTI is
determined from the time slot number in which the preamble is sent
If UE does not receive any response from the network, it increases its power in fixed step
and sends RACH preamble again
Step 2: Msg2
eNodeB sends "Random Access Response" to UE on DL-SCH (Downlink shared channel)
addressed to RA-RNTI calculated from the timeslot in which preamable was sent, as explained in
step 1 (about RA-RNTI calculation)
The message carries following information
Temporary C-RNTI: Now eNB gives another identity to UE which is called temporary
C-RNTI (cell radio network temporary identity) for further communication
Timing Advance Value: eNodeB also informs UE to change its timing so it can
compensate for the round trip delay caused by UE distance from the eNodeB
Uplink Grant Resource: Network (eNodeB) will assign initial resource to UE so that it
can use UL-SCH (Uplink shared channel)
Step 3: Msg3
Random value is used if UE is connecting for the very first time to network.
Why we need random value or TMSI? Because there is possibility that Temp-CRNTI has been
assigned to more than one UEs in previous step, due to multiple requests coming at same time
(Collision scenario explained later)
Connection establishment cause: The shows the reason why UE needs to connect to
network
Step 4: Msg4
structure carrying the control information is called 'MAC CE', which means
'MAC Control Element'.
This special MAC structure is implemented as a special bit string in LCID field
of MAC Header (Refer to LTE MAC page for the details of MAC header).
Ans:
UL data, for a logical channel which belongs to a LCG, becomes available for
transmission in the RLC entity or in the PDCP entity and either the data belongs to a logical
channel with higher priority than the priorities of the logical channels which belong to any LCG
and for which data is already available for transmission, or there is no data available for
transmission for any of the logical channels which belong to a LCG, in which case the BSR is
referred below to as "Regular BSR";
UL resources are allocated and number of padding bits is equal to or larger than the size
of the Buffer Status Report MAC control element plus its subheader, in which case the BSR is
referred below to as "Padding BSR"
retxBSR-Timer expires and the UE has data available for transmission for any of the
logical channels which belong to a LCG, in which case the BSR is referred below to as "Regular
BSR"
periodicBSR-Timer expires, in which case the BSR is referred below to as "Periodic
BSR".
R
Timing Advance Command
UL Grant
Temporary C-RNTI
Release 8 of LTE had cell specific reference signals.These reference signals are used
for both demodulation and channel estimation. the location of the cell specific signals is
known and is constant to all the UEs in that cell and hence can be used for
demodulation of PDSCH. The location of the C-RS depends on the Physical Cell ID, the
number of antennas. Also the C-RS is used for channel estimation based on PDSCH
power control. The reference power is specified in the system information and it is used
for Channel estimation.
However in Release 10, they changed the design slightly. They have separate signals
for Demodulation and Channel Estimation. Note that these signals are used by the
Release 10 UEs ALONGWITH the C-RS. DM-RS is configured using DMRS-Config-r11.
For the location of the DM-RS Config depends on which port on which the DM-RS is
being transmitted (=which in turn depends on what is the transmission mode of the UE).
See here for the examples of the location of DM-RS :
Handover Failure
The most likely reason for paging failures are as follow--* UE is defective and went out of order without being able to detach from the network.
* UE while in idle mode performed a new cell-(re)selection and is camping now on 3G or 2G cell without
informing the network properly about the new location that is geographically the same as before, but
covered by different RAT.
1. Insufficient coverage
4. wrong settings for broadcast reselection parameters.
received SECURITY MODE COMMAND by checking the Message Authentication Code (MAC)
in the SECURITY MODE COMMAND message. If the SECURITY MODE COMMANDmessage
fails the integrity protection check, then the UE sends SECURITY MODE FAILURE to
the eNodeB.
If the SECURITY MODE COMMAND passes the integrity protection check, then the UE
shall derive the encryption keys KRRCenc key and the KUPenc keys associated with the ciphering
algorithm indicated in theSECURITY MODE COMMAND.
The UE shall apply integrity protection using the indicated algorithm (EIA) and the
integrity key, KRRCintimmediately, i.e. integrity protection shall be applied to all subsequent
messages received and sent by the UE, including the SECURITY MODE COMPLETE message.
The UE shall apply ciphering using the indicated algorithm (EEA), KRRCenc key and
the KUPenc key after completing the procedure, i.e. ciphering shall be applied to all subsequent
messages received and sent by the UE, except for the SECURITY MODE COMPLETE message
which is sent un-ciphered.
36) How many default and dedicated bearer possible in lte?
Total 11 bearers 8 dedicated and 3 default bearers
37) Can there be multiple default bearer to same PDN?
One PDN can have more than one bearers, but it has more to do with QOS and TFT than with IP
addresses. You can assign both IPv4 and IPv6 addresses on one PDN in default bearer. Then you can
just create a bearer with different QOS and associate it with the same PDN. It will use same IPv4 and
IPv6 addresses as of default bearer.
transmitter. Hence, unlike open loop, closed loop operations occur when the access network execute dynamic
adjustment based on feedback from the UE.
signature it has to use. Of course, in this case Network will allocate these preamble
signature so that it would not collide. This kind of RACH process is called "Contention
Free" RACH procedure.
45) Why can we have only 8 simultaneously harq process in the uplink? [CLOSED
Why can we have only 8 simultaneously harq process in the uplink.
Is it applicable to downlink as well.