 1.01朱殿荣修订。根据郭宁反馈修订部分英文表述bug;将文中eNB全部更换为eNodeB;
修订文中部分图片不对其问题guo
 1.02朱殿荣修订。郭宁:
 p10,ip client 改为clock。
 胶片中多处RLP,是否改为RLC?
 另外,overhead这个词,名词解释有包头的意思吗?
 是否应该是header。。。或者用overall header????
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The eNodeB communicates with other NEs through the following five major interfaces:
 The S1 interface exists between the eNodeB and the S-GW/MME. One eNodeB
supports a maximum of 16 S1 interfaces.
 The X2 interface exists between the eNodeBs. It mainly implements the X2
handover function. One eNodeB supports a maximum of 32 X2 interfaces.
 The OM interface, also known as the OM channel, exists between the eNodeB and
the network management system.
 The clock interface, also known as the clock channel, exists between the eNodeB
and the IP clock server. The eNodeB, functioning as the clock client, obtains the
system clock from the clock packets that are periodically sent from the IP clock
server.
 The co-transmission interface, also called co-transmission channel, exists between
the eNodeB and other devices. Traffic of other devices is forwarded through the IP
routing function of the eNodeB. The other device can be a
GSM/CDMA/WiMAX/UMTS/LTE base station or an IP-based device.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The S1 interface can be subdivided into the S1-MME interface supporting Control Plane
signaling between the eNodeB and the MME and the S1-U Interface supporting User Plane
traffic between the eNodeB and the S-GW.
 S1 application protocol supports following functions
 E-RAB Management - this incorporates the setting up, modifying and releasing of
the E-RABs by the MME.
 Initial Context Transfer - this is used to establish an S1UE context in the eNodeB,
setup the default IP connectivity and transfer NAS related signaling.
 UE Capability Information Indication - this is used to inform the MME of the UE
Capability Information.
 Mobility - this incorporates mobility features to support a change in eNodeB or
change in RAT.
 Paging
 S1 Interface Management - this incorporates a number of sub functions dealing
with resets, load balancing and system setup etc.
 NAS Signaling Transport - this is used for the transport of NAS related signaling
over the S1-MME Interface.
 UE Context Modification and Release - this allows for the modification and release
of the established UE Context in the eNodeB and MME respectively.
 Location Reporting - this enables the MME to be made aware of the UEs current
location within the network.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 Defined by the IETF (Internet Engineering Task Force) rather than the 3GPP, SCTP was
developed to overcome the shortfalls in TCP (Transmission Control Protocol) and UDP
when transferring signaling information over an IP bearer. Functions provided by SCTP
include:
 Reliable delivery of higher layer payloads.
 Sequential delivery of higher layer payloads.
 Flow control.
 GTP-U tunnels are used to carry encapsulated PDU (Protocol Data Unit) and signaling
messages between endpoints. Numerous GTP-U tunnels may exist in order to differentiate
between EPS bearer contexts and these are identified through a TEID (Tunnel Endpoint
Identifier).
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 X2 interface interconnects two eNodeBs and in so doing supports both a control plane and
user plane. The principle control plane protocol is X2AP . This resides on SCTP where as
the User Plane IP is transferred using the services of GTP-U and UDP .
 The function of X2 AP is shown as following:
 Mobility Management - this enables the serving eNodeB to move the responsibility
of a specified UE to a target eNodeB. This includes Forwarding the User Plane,
Status Transfer and UE Context Release functions.
 Load Management - this function enables eNodeBs to communicate with each
other in order to report resource status, overload indications and current traffic
loading.
 Error Reporting - this allows for the reporting of general error situations for which
specific error reporting mechanism have not been defined.
 Setting / Resetting X2 - this provides a means by which the X2 interface can be
setup / reset by exchanging the necessary information between the eNodeBs.
 Configuration Update - this allows the updating of application level data which is
needed for two eNodeBs to interoperate over the X2 interface.
 For the SCTP and GTP, it performs the similar functions as it performs in S1 interface.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 IEEE1588 defines the PTP protocol, which applies to the standard Ethernet, with the
precision to microseconds.IEEE1588 V2 released in 2008 mainly incorporates the
improvements on higher frequency accuracy and less impact of the processing delay at the
intermediate transport equipment.
 The IEEE1588 standard targets precise synchronization of distributed and independent
clocks in measurement and control systems. In LTE applications, high-accuracy frequency
synchronization and time synchronization between clock servers and eNodeBs can be
achieved.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 When layer 1 network is adopted as the transport bearer network, the eNodeB and
adjacent NEs are connected through the physical layer. The Synchronous Digital Hierarchy
(SDH) network and Plesiochronous Digital Hierarchy (PDH) network are typical layer 1
networks. The eNodeB supports the access to the SDH/PDH network through the E1/T1
interface. The direct connection through the Ethernet interface, for example, the
connection of the eNodeB and the S-GW through the GE optical cable is a layer 1 network.
The following describes only the E1/T1 connection mode, because the direct connection
mode is rare in the actual situations.
 As shown above, the layer 1 network provides only the bearer function on the physical
layer, which is the simplest transport bearer mode. In this mode, the transmission to the
upper layers is transparent. When using a layer 1 networking solution, users need to
configure the related data concerning the physical layer, such as the attributes of the E1/T1
interface.
 The cost of renting the transport devices is usually high. In the case of the layer 1 network,
the channels are allocated in fixed mode. Therefore, the bandwidth utilization is low.
Besides, the bandwidth needs to be configured for each S1/X2 logical interface.
 The layer 1 transport bearer network is usually applied to the GSM/UMTS system that
provides mainly the CS service. It is rarely applied to the LTE system that provides mainly
the PS service.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The layer 2 network is usually adopted as the transport bearer network of the LTE system.
The layer 2 network in the LTE system is the Ethernet switching network. The major device
is the Ethernet switch. The eNodeB accesses the Ethernet switching network through the
FE/GE interface.
 As shown above, the layer 2 network provides the bearer function on the MAC layer. The
MAC layer is the data link layer protocol of the Ethernet. Complying with the IEEE 802.3,
the MAC layer provides addressing and data access control mechanisms.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The layer 3 network in the LTE system is the IP routing network. The major device is the
router. The eNodeB accesses the IP routing network through the FE/GE interface or the
E1/T1 interface.
 As shown above, the layer 3 network provides the bearer function on the IP layer. Users
need to configure the physical layer, data link layer, and IP layer.
 The configuration of the physical layer and data link layer involves the configuration of the
E1/T1 interface and FE/GE interface.
 The configuration of the IP layer involves the configuration of the IP addresses, IP route list,
and DiffServ.
 The layer 3 network is usually adopted as the transport bearer network of the LTE system.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 MAC provides the interface between the E-UTRA protocols and the E-UTRA Physical Layer.
In doing this it provides the following services:
 Mapping - MAC maps the information received on the LTE Logical Channels into
the LTE transport channels.
 Multiplexing - The information provided to MAC will come from a RB (Radio Bearer)
or multiple Radio Bearers. The MAC layer is able to multiplex different bearers into
the same TB (Transport Block), thus increasing efficiency.
 HARQ (Hybrid Automatic Repeat Request) - MAC utilizes HARQ to provide error
correction services across the air. HARQ is a feature which requires the MAC and
Physical Layers to work closely together.
 Radio Resource Allocation - QoS (Quality of Service) based scheduling of traffic and
signaling to users is provided by MAC.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The RLC protocol exists in the UE and the eNodeB. As its name suggests it provides “radio
link” control, if required. In essence, RLC supports three delivery services to the higher
layers:
 TM (Transparent Mode) - This is utilized for some of the air interface channels, e.g.
broadcast and paging. It provides a connectionless service for signaling.
 UM (Unacknowledged Mode) - This is like Transparent Mode, in that it is a
connectionless service; however it has the additional features of sequencing,
segmentation and concatenation.
 AM (Acknowledged Mode) - This offers an ARQ (Automatic Repeat Request)
service. As such, retransmissions can be used.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 PDCP (Packet Data Convergence Protocol) provides services to both the Control Plane and
User Plane. The main PDCP functions include:
 Header compression and decompression of IP datagrams using the ROHC (Robust
Header Compression) protocol.
 Maintenance of PDCP SN (Sequence Number) for radio bearers operating in RLC
AM (Acknowledged Mode).
 In-sequence delivery of upper layer PDU (Protocol Data Units) at handover.
 Duplicate elimination of lower layer SDUs at handover for RLC AM radio bearers.
 Ciphering and deciphering of User and Control Plane data.
 Integrity protection and integrity verification of the Control Plane data.
 Discarding of data on a timeout basis.
 Discarding of data on a duplicate basis.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 In radio systems, the resources on the LTE-Uu interface are far more precious than the
processing capability of processors. Therefore, ROHC is suitable for radio systems, even
though it is complex compared with earlier schemes. It is mainly used for VoIP services.
 In LTE, the ROHC entity is located within the Packet Data Convergence Protocol (PDCP)
entity on the user planes of the UE and the eNodeB, and is used only for the header
compression and decompression of data packets on the user plane.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 GTP-U tunnels are used to carry encapsulated PDU (Protocol Data Unit) between endpoints
or in the case of the X2 interface.
 Numerous GTP-U tunnels may exist in order to differentiate between EPS bearer contexts
and these are identified through a TEID (Tunnel Endpoint Identifier).
 The average header for GTP-U is 12 bytes, consist of following part
 Version: Specify the GTP protocol version
 P flag: Indicate whether another GTPv2-C message with its own header and body
shall be present at the end of the current message
 T flag: Indicate the presence or not of the TEID field.
 Message Type: Indicate the type of GTP message.
 TEID: Indicate the unique GTP channel. It is unique per EPS bearer for GTP-U and
per PDN connection for GTP-C.
 Sequence Number: Allows in-order delivery of user plane PDU.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 Access control based on IEEE 802.1x ensure the authorized accesses of the eNodeB to the
transport network. For details, see section ‎5.2 "Access Control Based on IEEE 802.1x." To
adapt to the all-IP based transmission mode of the LTE system, the eNodeB uses the IPSec
security mechanism to ensure the confidentiality, integrity, and availability of data
transmission. IPSec services are the security services provided for the IP layer, and thus can
be used by the upper-layer protocols such as the TCP, UDP, ICMP, and SCTP. IPSec is a
protocol family used to guarantee the security for IP communication.
 For transmission of IP packets, IPSec guarantees high-quality and interoperable security
based on cryptology. Ciphering and integrity verification are performed on the IP layer
between specific communicating parties to guarantee the following security features of
packet transmission:
 Data confidentiality: Ciphering protection is performed on user data, which is
transmitted in ciphered text.
 Data integrity: The received data is authenticated to check whether or not the data
is modified.
 Authentication: The data source is authenticated to guarantee that data is
transmitted from an authenticated sender.
 Replay protection: The attack by unauthorized users, who repeatedly transmit the
captured packets, is prevented. The party under the attack does not accept the old
or repeated packets.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 IPSec supports two security protocols: the Authentication Header (AH) protocol and
Encapsulation Security Protocol (ESP) protocol. The AH protocol performs integrity
protection, and the ESP protocol performs both integrity protection and ciphering.
 IPSec supports two packet encapsulation modes: transport mode and tunnel mode. The
difference between the transport mode and the tunnel mode is the IP packet protection
scope.
 Transport mode: protects the effective payload and upper-layer protocols (ULPs) of
IP packets. In transport mode, the IPSec headers (AH or ESP) are placed behind the
IP header and before the ULPs.
 Tunnel mode: protects the security for original IP packets. In tunnel mode, the
original IP packet is encapsulated into a new IP packet, and the IPSec header is
inserted between the headers (AH and/or ESP) of the new and original IP packets.
The header of the original IP packet is protected as part of the effective payload.
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 Virtual Local Area Network (VLAN) is a data exchange technology derived from the
traditional LAN.
 VLAN allows LAN devices to be logically grouped into multiple network segments (that is,
smaller LANs) to implement virtual workgroups. The hosts in different VLANs are separated
from each other and they communicate with each other only through routers. A VLAN is a
broadcast domain, that is, a host in a VLAN can receive the broadcast packets from the
other hosts in the same VLAN but cannot receive the broadcast packets from other VLANs.
The VLAN attaches different labels to the operation, administration, and maintenance
(OAM) data and the traffic data. Thus, differentiated services can be provided. The VLAN
also provides services of different priorities and security levels on the MAC layer.
 The VLAN header consists of following parts:
 TPID: Tag protocol identifier, indicate that it is the frame with 802.1Q, the value is
fixed with 0x8100, the length is 2 bytes
 PRI: Priority indicator, 3 bits
 CFI: Canonical Format Indicator, 1 bit
 VLAN ID: Indicate which VLAN belongs to, 12 bits
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 From the capacity dimensioning, we can get throughput of radio interface, including the
overhead of radio interface. So the radio payload throughput can be calculated. During the
IP transport, the additional overhead will be added, from the analysis of overhead, we can
get the throughput of transport layer.
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 PDCP: Packet Data Convergence Protocol, perform data integrity check and ciphering
function.
 ROHC: Robust of head compression, it is a kind of head compression technology
 RLC: Radio link control protocol
 MAC: Perform scheduling control function
 CRC: Cyclic redundancy check
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
 The LMPT provides four Ethernet interfaces, that is, two optical interfaces (SFP,
100/1000BASE-FX) and two electrical interfaces (RJ45, 10/100/1000BASE-TX). Two
interfaces can be used in combined mode. Multi-mode optical cable or single-mode optical
cable can be used according to the type of the optical module.
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
LTE Access Transport Network Dimensioning
Confidential Information of Huawei. No Spreading Without Permission
Course Name
Confidential Information of Huawei. No Spreading Without Permission
N-39
LTE IP Transport Design & Dimensioning
Confidential Information of Huawei. No Spreading Without Permission

More Related Content

PDF
How to dimension user traffic in LTE
PPT
01 lte radio_parameters_lte_overview_rl1
PDF
AIRCOM LTE Webinar 5 - LTE Capacity
DOCX
UMTS/3G RAN Capacity Management Guideline Part-02 (Sectorization))
PDF
LTE Interference troubleshooting guide
DOCX
Lte coverage optimization analysis
PDF
Kpi 2g troubleshootin
PDF
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...
How to dimension user traffic in LTE
01 lte radio_parameters_lte_overview_rl1
AIRCOM LTE Webinar 5 - LTE Capacity
UMTS/3G RAN Capacity Management Guideline Part-02 (Sectorization))
LTE Interference troubleshooting guide
Lte coverage optimization analysis
Kpi 2g troubleshootin
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...

What's hot (20)

PDF
gsm-kpi-optimization
PPT
Part 3 optimization 3G
PPT
Huawei case analysis call drop
DOCX
Layer 3 messages
PDF
Lte capacity monitoring
DOC
11 gsm bss network kpi (paging success rate) optimization manual
PPTX
5G NR parameters
PPT
Nokia gsm-kpi-analysis-based-on-daily-monitoring-basis-presentation
PDF
Huawei GSM Principles
PPTX
Sharing session huawei network optimization january 2015 ver3
PDF
Transmission resource management
PPT
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...
DOC
Factors affecting lte throughput and calculation methodology
PPT
Lte network planning huawei technologies
PPTX
RSCP RSSI EC/NO CQI
PPTX
GSM Location area update
PPT
63077585 idle-mode-parameter-optimization
PDF
4.oeo000040 lte traffic fault diagnosis issue 1
PDF
Ubbp
PDF
Simplified Call Flow Signaling: 2G/3G Voice Call
gsm-kpi-optimization
Part 3 optimization 3G
Huawei case analysis call drop
Layer 3 messages
Lte capacity monitoring
11 gsm bss network kpi (paging success rate) optimization manual
5G NR parameters
Nokia gsm-kpi-analysis-based-on-daily-monitoring-basis-presentation
Huawei GSM Principles
Sharing session huawei network optimization january 2015 ver3
Transmission resource management
Training document e ran2.2_lte tdd system multiple antenna techniques(mimo an...
Factors affecting lte throughput and calculation methodology
Lte network planning huawei technologies
RSCP RSSI EC/NO CQI
GSM Location area update
63077585 idle-mode-parameter-optimization
4.oeo000040 lte traffic fault diagnosis issue 1
Ubbp
Simplified Call Flow Signaling: 2G/3G Voice Call
Ad

Viewers also liked (18)

PDF
Lte transport requirements
PDF
Lte optimization
PDF
5.oep100330 lte cell_planning_issue1.10
PDF
Notes for scft
PDF
WiMAX & LTE Network Introduce For Swift
PPT
Chap05 gtp 03_kh
PPTX
LTE paging.ppt
PDF
Huawei hss9860 v900 r008c20 production description
PPSX
Paging in LTE
PDF
VoLTE Service Monitoring - VoLTE Voice Call
PDF
20090408 11c9892102535c929b1bw mypajf_eub8l
PDF
LTE Planning
PPTX
IMS Session Flow
PPTX
IMS Registration Flow
DOC
Ims call flow
PPTX
Introduction to Evolved Packet Core Networks
PDF
Throughput Calculation for LTE TDD and FDD System
PDF
LTE: X2 interface
Lte transport requirements
Lte optimization
5.oep100330 lte cell_planning_issue1.10
Notes for scft
WiMAX & LTE Network Introduce For Swift
Chap05 gtp 03_kh
LTE paging.ppt
Huawei hss9860 v900 r008c20 production description
Paging in LTE
VoLTE Service Monitoring - VoLTE Voice Call
20090408 11c9892102535c929b1bw mypajf_eub8l
LTE Planning
IMS Session Flow
IMS Registration Flow
Ims call flow
Introduction to Evolved Packet Core Networks
Throughput Calculation for LTE TDD and FDD System
LTE: X2 interface
Ad

Similar to 4 lte access transport network dimensioning issue 1.02 (20)

PPTX
Umts transmission features presentation v1[1].0
PPT
0AA001 Data Communication Basis ISSUE2.0.ppt
PPTX
1-LTE&NR Architecture & principles EMERSON EDUARDO RODRIGUES.pptx
PDF
Lte protocol Stack
PDF
PLNOG 17 - Piotr Gruszczyński - Mobile Fronthaul - ewolucja (a może i rewoluc...
PDF
fdocuments.in_lte-eutran-protocol-pdf.pdf
PPSX
HPE Training uts prs PowerPoint presentation
PDF
LTE Training for Abuja Team
PDF
LTE Architecture Overview
PDF
LTE EPC Technology Essentials
PDF
20786641 lte-whitepaper
PDF
D06.VoLTE Interfaces , Protocols & IMS Stack.pdf
PDF
VoLTE Interfaces , Protocols & IMS Stack Explained
PDF
LTE Technical Overview
PDF
LTE - protocol - signaling (4G course).pdf
PPT
Webinar ethernet basics part a v1.3
PPT
OEA300020 LTE Signaling Flow ISSUE 1.00.ppt
PDF
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
PPTX
6 celllular networks1570614843 stalings.pptx
PDF
Lte network planning_huawei_pdf
Umts transmission features presentation v1[1].0
0AA001 Data Communication Basis ISSUE2.0.ppt
1-LTE&NR Architecture & principles EMERSON EDUARDO RODRIGUES.pptx
Lte protocol Stack
PLNOG 17 - Piotr Gruszczyński - Mobile Fronthaul - ewolucja (a może i rewoluc...
fdocuments.in_lte-eutran-protocol-pdf.pdf
HPE Training uts prs PowerPoint presentation
LTE Training for Abuja Team
LTE Architecture Overview
LTE EPC Technology Essentials
20786641 lte-whitepaper
D06.VoLTE Interfaces , Protocols & IMS Stack.pdf
VoLTE Interfaces , Protocols & IMS Stack Explained
LTE Technical Overview
LTE - protocol - signaling (4G course).pdf
Webinar ethernet basics part a v1.3
OEA300020 LTE Signaling Flow ISSUE 1.00.ppt
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
6 celllular networks1570614843 stalings.pptx
Lte network planning_huawei_pdf

Recently uploaded (20)

PPTX
Chapter 5: Probability Theory and Statistics
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPT
What is a Computer? Input Devices /output devices
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Five Habits of High-Impact Board Members
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
The various Industrial Revolutions .pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Benefits of Physical activity for teenagers.pptx
PPT
Geologic Time for studying geology for geologist
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
DOCX
search engine optimization ppt fir known well about this
Chapter 5: Probability Theory and Statistics
1 - Historical Antecedents, Social Consideration.pdf
What is a Computer? Input Devices /output devices
A novel scalable deep ensemble learning framework for big data classification...
Five Habits of High-Impact Board Members
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Tartificialntelligence_presentation.pptx
The various Industrial Revolutions .pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
WOOl fibre morphology and structure.pdf for textiles
A contest of sentiment analysis: k-nearest neighbor versus neural network
Module 1.ppt Iot fundamentals and Architecture
Benefits of Physical activity for teenagers.pptx
Geologic Time for studying geology for geologist
Taming the Chaos: How to Turn Unstructured Data into Decisions
Developing a website for English-speaking practice to English as a foreign la...
Final SEM Unit 1 for mit wpu at pune .pptx
search engine optimization ppt fir known well about this

4 lte access transport network dimensioning issue 1.02

  • 1.  1.01朱殿荣修订。根据郭宁反馈修订部分英文表述bug;将文中eNB全部更换为eNodeB; 修订文中部分图片不对其问题guo  1.02朱殿荣修订。郭宁:  p10,ip client 改为clock。  胶片中多处RLP,是否改为RLC?  另外,overhead这个词,名词解释有包头的意思吗?  是否应该是header。。。或者用overall header???? LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 2. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 3. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 4. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 5. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 6.  The eNodeB communicates with other NEs through the following five major interfaces:  The S1 interface exists between the eNodeB and the S-GW/MME. One eNodeB supports a maximum of 16 S1 interfaces.  The X2 interface exists between the eNodeBs. It mainly implements the X2 handover function. One eNodeB supports a maximum of 32 X2 interfaces.  The OM interface, also known as the OM channel, exists between the eNodeB and the network management system.  The clock interface, also known as the clock channel, exists between the eNodeB and the IP clock server. The eNodeB, functioning as the clock client, obtains the system clock from the clock packets that are periodically sent from the IP clock server.  The co-transmission interface, also called co-transmission channel, exists between the eNodeB and other devices. Traffic of other devices is forwarded through the IP routing function of the eNodeB. The other device can be a GSM/CDMA/WiMAX/UMTS/LTE base station or an IP-based device. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 7.  The S1 interface can be subdivided into the S1-MME interface supporting Control Plane signaling between the eNodeB and the MME and the S1-U Interface supporting User Plane traffic between the eNodeB and the S-GW.  S1 application protocol supports following functions  E-RAB Management - this incorporates the setting up, modifying and releasing of the E-RABs by the MME.  Initial Context Transfer - this is used to establish an S1UE context in the eNodeB, setup the default IP connectivity and transfer NAS related signaling.  UE Capability Information Indication - this is used to inform the MME of the UE Capability Information.  Mobility - this incorporates mobility features to support a change in eNodeB or change in RAT.  Paging  S1 Interface Management - this incorporates a number of sub functions dealing with resets, load balancing and system setup etc.  NAS Signaling Transport - this is used for the transport of NAS related signaling over the S1-MME Interface.  UE Context Modification and Release - this allows for the modification and release of the established UE Context in the eNodeB and MME respectively.  Location Reporting - this enables the MME to be made aware of the UEs current location within the network. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 8.  Defined by the IETF (Internet Engineering Task Force) rather than the 3GPP, SCTP was developed to overcome the shortfalls in TCP (Transmission Control Protocol) and UDP when transferring signaling information over an IP bearer. Functions provided by SCTP include:  Reliable delivery of higher layer payloads.  Sequential delivery of higher layer payloads.  Flow control.  GTP-U tunnels are used to carry encapsulated PDU (Protocol Data Unit) and signaling messages between endpoints. Numerous GTP-U tunnels may exist in order to differentiate between EPS bearer contexts and these are identified through a TEID (Tunnel Endpoint Identifier). LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 9.  X2 interface interconnects two eNodeBs and in so doing supports both a control plane and user plane. The principle control plane protocol is X2AP . This resides on SCTP where as the User Plane IP is transferred using the services of GTP-U and UDP .  The function of X2 AP is shown as following:  Mobility Management - this enables the serving eNodeB to move the responsibility of a specified UE to a target eNodeB. This includes Forwarding the User Plane, Status Transfer and UE Context Release functions.  Load Management - this function enables eNodeBs to communicate with each other in order to report resource status, overload indications and current traffic loading.  Error Reporting - this allows for the reporting of general error situations for which specific error reporting mechanism have not been defined.  Setting / Resetting X2 - this provides a means by which the X2 interface can be setup / reset by exchanging the necessary information between the eNodeBs.  Configuration Update - this allows the updating of application level data which is needed for two eNodeBs to interoperate over the X2 interface.  For the SCTP and GTP, it performs the similar functions as it performs in S1 interface. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 10. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 11.  IEEE1588 defines the PTP protocol, which applies to the standard Ethernet, with the precision to microseconds.IEEE1588 V2 released in 2008 mainly incorporates the improvements on higher frequency accuracy and less impact of the processing delay at the intermediate transport equipment.  The IEEE1588 standard targets precise synchronization of distributed and independent clocks in measurement and control systems. In LTE applications, high-accuracy frequency synchronization and time synchronization between clock servers and eNodeBs can be achieved. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 12.  When layer 1 network is adopted as the transport bearer network, the eNodeB and adjacent NEs are connected through the physical layer. The Synchronous Digital Hierarchy (SDH) network and Plesiochronous Digital Hierarchy (PDH) network are typical layer 1 networks. The eNodeB supports the access to the SDH/PDH network through the E1/T1 interface. The direct connection through the Ethernet interface, for example, the connection of the eNodeB and the S-GW through the GE optical cable is a layer 1 network. The following describes only the E1/T1 connection mode, because the direct connection mode is rare in the actual situations.  As shown above, the layer 1 network provides only the bearer function on the physical layer, which is the simplest transport bearer mode. In this mode, the transmission to the upper layers is transparent. When using a layer 1 networking solution, users need to configure the related data concerning the physical layer, such as the attributes of the E1/T1 interface.  The cost of renting the transport devices is usually high. In the case of the layer 1 network, the channels are allocated in fixed mode. Therefore, the bandwidth utilization is low. Besides, the bandwidth needs to be configured for each S1/X2 logical interface.  The layer 1 transport bearer network is usually applied to the GSM/UMTS system that provides mainly the CS service. It is rarely applied to the LTE system that provides mainly the PS service. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 13.  The layer 2 network is usually adopted as the transport bearer network of the LTE system. The layer 2 network in the LTE system is the Ethernet switching network. The major device is the Ethernet switch. The eNodeB accesses the Ethernet switching network through the FE/GE interface.  As shown above, the layer 2 network provides the bearer function on the MAC layer. The MAC layer is the data link layer protocol of the Ethernet. Complying with the IEEE 802.3, the MAC layer provides addressing and data access control mechanisms. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 14.  The layer 3 network in the LTE system is the IP routing network. The major device is the router. The eNodeB accesses the IP routing network through the FE/GE interface or the E1/T1 interface.  As shown above, the layer 3 network provides the bearer function on the IP layer. Users need to configure the physical layer, data link layer, and IP layer.  The configuration of the physical layer and data link layer involves the configuration of the E1/T1 interface and FE/GE interface.  The configuration of the IP layer involves the configuration of the IP addresses, IP route list, and DiffServ.  The layer 3 network is usually adopted as the transport bearer network of the LTE system. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 15. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 16. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 17. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 18. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 19.  MAC provides the interface between the E-UTRA protocols and the E-UTRA Physical Layer. In doing this it provides the following services:  Mapping - MAC maps the information received on the LTE Logical Channels into the LTE transport channels.  Multiplexing - The information provided to MAC will come from a RB (Radio Bearer) or multiple Radio Bearers. The MAC layer is able to multiplex different bearers into the same TB (Transport Block), thus increasing efficiency.  HARQ (Hybrid Automatic Repeat Request) - MAC utilizes HARQ to provide error correction services across the air. HARQ is a feature which requires the MAC and Physical Layers to work closely together.  Radio Resource Allocation - QoS (Quality of Service) based scheduling of traffic and signaling to users is provided by MAC. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 20.  The RLC protocol exists in the UE and the eNodeB. As its name suggests it provides “radio link” control, if required. In essence, RLC supports three delivery services to the higher layers:  TM (Transparent Mode) - This is utilized for some of the air interface channels, e.g. broadcast and paging. It provides a connectionless service for signaling.  UM (Unacknowledged Mode) - This is like Transparent Mode, in that it is a connectionless service; however it has the additional features of sequencing, segmentation and concatenation.  AM (Acknowledged Mode) - This offers an ARQ (Automatic Repeat Request) service. As such, retransmissions can be used. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 21.  PDCP (Packet Data Convergence Protocol) provides services to both the Control Plane and User Plane. The main PDCP functions include:  Header compression and decompression of IP datagrams using the ROHC (Robust Header Compression) protocol.  Maintenance of PDCP SN (Sequence Number) for radio bearers operating in RLC AM (Acknowledged Mode).  In-sequence delivery of upper layer PDU (Protocol Data Units) at handover.  Duplicate elimination of lower layer SDUs at handover for RLC AM radio bearers.  Ciphering and deciphering of User and Control Plane data.  Integrity protection and integrity verification of the Control Plane data.  Discarding of data on a timeout basis.  Discarding of data on a duplicate basis. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 22.  In radio systems, the resources on the LTE-Uu interface are far more precious than the processing capability of processors. Therefore, ROHC is suitable for radio systems, even though it is complex compared with earlier schemes. It is mainly used for VoIP services.  In LTE, the ROHC entity is located within the Packet Data Convergence Protocol (PDCP) entity on the user planes of the UE and the eNodeB, and is used only for the header compression and decompression of data packets on the user plane. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 23. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 24.  GTP-U tunnels are used to carry encapsulated PDU (Protocol Data Unit) between endpoints or in the case of the X2 interface.  Numerous GTP-U tunnels may exist in order to differentiate between EPS bearer contexts and these are identified through a TEID (Tunnel Endpoint Identifier).  The average header for GTP-U is 12 bytes, consist of following part  Version: Specify the GTP protocol version  P flag: Indicate whether another GTPv2-C message with its own header and body shall be present at the end of the current message  T flag: Indicate the presence or not of the TEID field.  Message Type: Indicate the type of GTP message.  TEID: Indicate the unique GTP channel. It is unique per EPS bearer for GTP-U and per PDN connection for GTP-C.  Sequence Number: Allows in-order delivery of user plane PDU. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 25. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 26. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 27.  Access control based on IEEE 802.1x ensure the authorized accesses of the eNodeB to the transport network. For details, see section ‎5.2 "Access Control Based on IEEE 802.1x." To adapt to the all-IP based transmission mode of the LTE system, the eNodeB uses the IPSec security mechanism to ensure the confidentiality, integrity, and availability of data transmission. IPSec services are the security services provided for the IP layer, and thus can be used by the upper-layer protocols such as the TCP, UDP, ICMP, and SCTP. IPSec is a protocol family used to guarantee the security for IP communication.  For transmission of IP packets, IPSec guarantees high-quality and interoperable security based on cryptology. Ciphering and integrity verification are performed on the IP layer between specific communicating parties to guarantee the following security features of packet transmission:  Data confidentiality: Ciphering protection is performed on user data, which is transmitted in ciphered text.  Data integrity: The received data is authenticated to check whether or not the data is modified.  Authentication: The data source is authenticated to guarantee that data is transmitted from an authenticated sender.  Replay protection: The attack by unauthorized users, who repeatedly transmit the captured packets, is prevented. The party under the attack does not accept the old or repeated packets. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 28.  IPSec supports two security protocols: the Authentication Header (AH) protocol and Encapsulation Security Protocol (ESP) protocol. The AH protocol performs integrity protection, and the ESP protocol performs both integrity protection and ciphering.  IPSec supports two packet encapsulation modes: transport mode and tunnel mode. The difference between the transport mode and the tunnel mode is the IP packet protection scope.  Transport mode: protects the effective payload and upper-layer protocols (ULPs) of IP packets. In transport mode, the IPSec headers (AH or ESP) are placed behind the IP header and before the ULPs.  Tunnel mode: protects the security for original IP packets. In tunnel mode, the original IP packet is encapsulated into a new IP packet, and the IPSec header is inserted between the headers (AH and/or ESP) of the new and original IP packets. The header of the original IP packet is protected as part of the effective payload. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 29.  Virtual Local Area Network (VLAN) is a data exchange technology derived from the traditional LAN.  VLAN allows LAN devices to be logically grouped into multiple network segments (that is, smaller LANs) to implement virtual workgroups. The hosts in different VLANs are separated from each other and they communicate with each other only through routers. A VLAN is a broadcast domain, that is, a host in a VLAN can receive the broadcast packets from the other hosts in the same VLAN but cannot receive the broadcast packets from other VLANs. The VLAN attaches different labels to the operation, administration, and maintenance (OAM) data and the traffic data. Thus, differentiated services can be provided. The VLAN also provides services of different priorities and security levels on the MAC layer.  The VLAN header consists of following parts:  TPID: Tag protocol identifier, indicate that it is the frame with 802.1Q, the value is fixed with 0x8100, the length is 2 bytes  PRI: Priority indicator, 3 bits  CFI: Canonical Format Indicator, 1 bit  VLAN ID: Indicate which VLAN belongs to, 12 bits LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 30. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 31. LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 32.  From the capacity dimensioning, we can get throughput of radio interface, including the overhead of radio interface. So the radio payload throughput can be calculated. During the IP transport, the additional overhead will be added, from the analysis of overhead, we can get the throughput of transport layer. LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 33.  PDCP: Packet Data Convergence Protocol, perform data integrity check and ciphering function.  ROHC: Robust of head compression, it is a kind of head compression technology  RLC: Radio link control protocol  MAC: Perform scheduling control function  CRC: Cyclic redundancy check LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 34. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 35. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 36. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 37. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 38.  The LMPT provides four Ethernet interfaces, that is, two optical interfaces (SFP, 100/1000BASE-FX) and two electrical interfaces (RJ45, 10/100/1000BASE-TX). Two interfaces can be used in combined mode. Multi-mode optical cable or single-mode optical cable can be used according to the type of the optical module. LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 39. LTE Access Transport Network Dimensioning Confidential Information of Huawei. No Spreading Without Permission
  • 40. Course Name Confidential Information of Huawei. No Spreading Without Permission N-39
  • 41. LTE IP Transport Design & Dimensioning Confidential Information of Huawei. No Spreading Without Permission