You are on page 1of 324

Table of Contents

3

LTE/ LTE/ LTE/ LTE/E EE EPS PS PS PSTechnology Technology Technology Technology
Book revision 4.0.2

TableofContents TableofContents TableofContents TableofContents
Chapter Chapter Chapter Chapter Page Page Page Page
1. Introduction ....... 5
2. Architecture .. 27
3. OFDMA & SC-FDMA ..... 49
4. E-UTRAN ..... 95
5. Core Network .... 133
6. Policy control & charging ..... 167
7. Traffic cases .. 177
8. Security . 213
9. EPS Management .. 237
10. Services ..... 249
11. CS Fallback and SMSoSGs .. 297
12. Acronyms & abbreviations ....... 313
LTE/EPS Technology
4

This page is intentionally left blank
1 Introduction
5
Chapter Chapter Chapter Chapter1 11 1
Introduction Introduction Introduction Introduction
Topic Topic Topic Topic Page Page Page Page
Introduction........................................................................................................ 7
HSPA +............................................................................................................ 12
LTE / E-UTRAN.............................................................................................. 17
EPS / SAE........................................................................................................ 24
IMS .................................................................................................................. 25
LTE/EPS Technology

6

This page is intentionally left blank
1 Introduction
7
Introduction Introduction Introduction Introduction
This chapter discusses the evolution and migration of wireless-data
technologies from EDGE to LTE as well as the evolution of underlying
wireless approaches. Progress happens in multiple phases, first with EDGE,
and then UMTS, followed by evolved 3G capabilities such as HSDPA,
HSUPA, HSPA+, and eventually LTE. Meanwhile, underlying approaches
have evolved from TDMA to CDMA, and now from CDMA to Orthogonal
Frequency Division Multiple Access (OFDMA), which is the basis of Long
Term Evolution (LTE).
TDMA,CDMAandOFDMA TDMA,CDMAandOFDMA TDMA,CDMAandOFDMA TDMA,CDMAandOFDMA
Many times, one technology or the other is positioned as having fundamental
advantages over another. However, any of these three approaches, when fully
optimized, can effectively match the capabilities of any other. For example,
GSM, which is based on TDMA, thanks to innovations like synchronized
frequency hopping, AMR, and EDGE for data performance optimisation,
GSM is able to effectively compete with the capacity and data throughput of
CDMA based systems.
Today, the main question is whether OFDM provide any inherent advantage
over TDMA or CDMA. For systems employing less than 10 MHz of
bandwidth, the answer no. Because it transmits mutually orthogonal
subchannels at a lower symbol rate, the fundamental advantage of OFDM is
that it elegantly addresses the problem of Inter Symbol Interference (ISI)
induced by multipath and greatly simplifies channel equalization. As such,
OFDM systems, assuming they employ all the other standard techniques for
maximizing spectral efficiency, may achieve slightly higher spectral
efficiency than CDMA systems. However, advanced receiver architectures,
including options such as practical equalization approaches and interference
cancellation techniques, are already commercially available in chipsets and
can nearly match this performance advantage. It is with larger bandwidths (10
to 20 MHz), and in combination with advanced antenna approaches such as
Multiple Input Multiple Output (MIMO) or Adaptive Antenna Systems
(AAS), that OFDM enables less computationally complex implementations
than those based on CDMA.
Hence, OFDM is more readily realizable in mobile devices. However, studies
have shown that the complexity advantage of OFDM may be quite small (that
is, less than a factor of two) if frequency domain equalizers are used for
LTE/EPS Technology

8
CDMA-based technologies. Still, the advantage of reducing complexity is one
reason 3GPP chose OFDM for its LTE project. It is also one reason newer
WLAN standards, which employ 20 MHz radio channels, are based on
OFDM. In other words, OFDM is currently a favoured approach under
consideration for radio systems that have extremely high peak rates. OFDM
also has an advantage in that it can scale easily for different amounts of
available bandwidth. This in turn allows OFDM to be progressively deployed
in available spectrum by using different numbers of subcarriers.
An OFDMA technology such as LTE can also take better advantage of wider
radio channels (for example, 10 MHz) by not requiring guard bands between
radio carriers (for example, HSPA carriers). In recent years, the ability of
OFDM to cope with multipath has also made it the technology of choice for
the design of Digital Broadcast Systems (DBS).
In 5 MHz of spectrum, as used by UMTS/HSPA, continual advances with
CDMA technology (realized in HSPA+) through approaches such as
equalization, MIMO, interference cancellation, and high-order modulation
will allow CDMA to largely match OFDMA-based systems.
Because OFDMA has only modest advantages over CDMA in 5 MHz
channels, the advancement of HSPA is a logical and effective strategy. In
particular, it extends the life of operators large 3G investments, reducing
overall infrastructure investments, decreasing capital and operational
expenditures, and allowing operators to offer competitive services.
3GPPevolutionaryapproach 3GPPevolutionaryapproach 3GPPevolutionaryapproach 3GPPevolutionaryapproach
Rather than emphasizing any one wireless approach, 3GPPs evolutionary
plan is to recognize the strengths and weaknesses of every technology and to
exploit the unique capabilities of each one accordingly. GSM, based on a
TDMA approach, is mature and broadly deployed. Already extremely
efficient, there are nevertheless opportunities for additional optimizations and
enhancements.
Standards bodies have already defined evolved EDGE, that doubles the
performance of current EDGE systems.
The evolved data systems for UMTS, such as HSPA and HSPA+, introduce
enhancements and simplifications that help CDMA based systems match the
capabilities of competing systems, especially in 5 MHz spectrum allocations.
Given some of the advantages of an OFDM approach, 3GPP has specified
OFDMA as the basis of its LTE effort. LTE incorporates best-of-breed radio
techniques to achieve performance levels beyond what will be practical with
CDMA approaches, particularly in larger channel bandwidths. However, in
the same way that 3G coexists with 2G systems in integrated networks, LTE
1 Introduction
9
systems will coexist with both 3G systems and 2G systems. Multimode
devices will function across LTE/3G or even LTE/3G/2G, depending on
market circumstances.
2006 2007 2008 2009 2010 2011
3GPP GSM EDGE Radio Access Network Evolution
3GPP UMTS Radio Access Network Evolution
EDGE
DL: 474 kbps
UL: 474 kbps
Evolved EDGE
DL: 1.9 Mbps
UL: 947 kbps
HSDPA
DL: 14.4 Mbps
UL: 384 kbps
In 5 Mhz
HSDPA/HSUPA
DL: 14.4 Mbps
UL: 5.76 Mbps
In 5 Mhz
Rel 7 HSPA+
DL: 28 Mbps
UL: 11.5 Mbps
In 5 Mhz
Rel 8 HSPA+
DL: 42 Mbps
UL: 11.5 Mbps
In 5 Mhz
3GPP Long Term Evolution
LTE 2X2 MIMO
DL: 173 Mbps
UL: 58 Mbps
In 20 Mhz
LTE 4X4 MIMO
DL: 326 Mbps
UL: 86 Mbps
In 20 Mhz
EV-DO Rev 0
DL: 2.4 Mbps
UL: 153 kbps
In 1.25 Mhz
EV-DO Rev A
DL: 3.1 Mbps
UL: 1.8 Mbps
In 1.25 Mhz
EV-DO Rev B
DL: 14.7 Mbps
UL: 4.9 Mbps
In 5 Mhz
UMB 2X2 MIMO
DL: 140 Mbps
UL: 34 Mbps
In 20 Mhz
CDMA 2000 Evolution
UMB 4X4 MIMO
DL: 280 Mbps
UL: 68 Mbps
In 20 Mhz
Fixed WiMAX
Wave 1
DL: 23 Mbps
UL: 4 Mbps
10 Mhz 3:1 TDD
Wave 2
DL: 46 Mbps
UL: 4 Mbps
10 Mhz 3:1 TDD
Mobile WiMAX Evolution
IEEE 802.16m

Figure 1-1 Different wireless technologies and their evolution
The development of GSM and UMTS/HSPA happens in stages referred to as
3GPP releases, and equipment vendors produce hardware that supports
particular versions of each specification. It is important to realize that the
3GPP releases address multiple technologies. For example, R7 optimizes
VoIP for HSPA but also significantly enhances GSM data functionality with
Evolved EDGE. A summary of the different 3GPP releases follows:
Release 99 ( completed) - First deployable version of UMTS.
Enhancements to GSM data (EDGE). Provides support for
GSM/GPRS/EDGE/WCDMA radio-access networks.
Release 4 (completed). Multimedia messaging support. First steps
toward using IP transport in the CN.
Release 5 (completed): HSDPA. First phase of IMS. Full ability to use
IP-based transport instead of just ATM in the CN.
Release 6 (completed): HSUPA. Enhanced multimedia support
through Multimedia Broadcast/Multicast Services (MBMS).
Performance specifications for advanced receivers. WLAN integration
option. IMS enhancements. Initial VoIP capability.
Release 7 (completed): Provides enhanced GSM data functionality
with Evolved EDGE. Specifies HSPA Evolution (HSPA+), which
includes higher order modulation and MIMO. Also includes fine-
tuning and incremental improvements of features from previous
LTE/EPS Technology

10
releases. Results include performance enhancements, improved
spectral efficiency, increased capacity, and better resistance to
interference. Continuous Packet Connectivity (CPC) enables efficient
always-on service and enhanced uplink VoIP capacity as well as
reductions in call setup delay for PoC. Radio enhancements include 64
QAM in the downlink DL and 16 QAM in the uplinks.
Release 8 (under development): Further HSPA Evolution features
such as simultaneous use of MIMO and 64 QAM. Specifies OFDMA-
based 3GPP LTE. Defines Evolved Packet System (EPS), previously
called System Architecture Evolution (SAE).
Core Core Core Core- -- -NetworkEvolution NetworkEvolution NetworkEvolution NetworkEvolution
3GPP is defining a series of enhancements to the CN to improve network
performance and the range of services provided and to enable a shift to all-IP
architectures. One way to improve CN performance is by using flatter
architectures. The more hierarchical a network, the more easily it can be
managed centrally; however, the trade-off is reduced performance, especially
for data communications, because packets must traverse and be processed by
multiple nodes in the network. To improve data performance and, in
particular, to reduce latency, 3GPP has defined a number of enhancements in
R7 and R8 that reduce the number of processing nodes and result in a flatter
architecture.
In R7, an option called one-tunnel architecture allows operators to configure
their networks so that user data bypasses a serving node and travels directly
via a gateway node. There is also an option to integrate the functionality of
the RNC controller directly into the NodeB.
For R8, 3GPP has defined an entirely new CN, called the Evolved Packet
System (EPS), earlier known under different name System Architecture
Evolution (SAE).
The key features and capabilities of EPS include:
reduced latency and higher data performance through a flatter
architecture,
support for both LTE radio access networks and interworking with
GERAN/UTRAN,
the ability to integrate non-3GPP networks such as WiMAX,
optimization for all services provided via IP,
1 Introduction
11
ServiceEvolution ServiceEvolution ServiceEvolution ServiceEvolution
Not only do 3GPP technologies provide continual improvements in capacity
and data performance, they also evolve capabilities that expand the services
available to subscribers. Key service advances include Fixed-Mobile
Convergence (FMC), IMS, and broadcasting technologies. This section
provides an overview of these topics, and the appendix provides greater detail
on each of these items.
FMC refers to the integration of fixed services (such as telephony provided by
wire line or WiFi) with mobile cellular-based services. Though FMC is still in
its early stages of deployment by operators, it promises to provide significant
benefits to both users and operators. For users, FMC will simplify how they
communicate, making it possible for them to use one device (for example, a
cell phone) at work and at home, where it might
connect via a WiFi network or a femtocell. When mobile, users connect via a
cellular network. Users will also benefit from single voice mailboxes and
single phone numbers as well as the ability to control how and with whom
they communicate. For operators, FMC allows the consolidation of core
services across multiple-access networks. For instance, an operator could
offer complete VoIP-based voice service that supports access
via DSL, WiFi, or 3G. FMC has various approaches, including enabling
technologies such as Unlicensed Mobile Access (UMA), femtocells, and IMS.
With 3GGP UMA, GSM/UMTS devices can connect via WiFi or cellular
connections for both voice and data.
An alternative to using WiFi for the fixed portion of FMC is femtocells.
These are tiny base stations that cost little more than a WiFi access point and,
like WiFi, femtocells leverage a subscriber's existing wire line broadband
connection (for example, DSL). Instead of operating on unlicensed bands,
femtocells use the operators licensed bands at very low power levels. The
key advantage of the femtocell approach is that any single mode mobile
communications device a user has can now operate using the femtocell.
IMS is another key technology for convergence. It allows access to core
services and applications via multiple-access networks. IMS is more powerful
than UMA, because it supports not only FMC but also a much broader range
of potential applications. Though defined by 3GPP, both 3GPP2 and WiMAX
have adopted IMS. IMS allows the creative blending of different types of
communications and information, including voice, video, IM, presence
information, location, and documents. It provides application developers the
ability to create applications that have never before been possible, and it
allows people to communicate in entirely new ways by dynamically using
multiple services. For example, during an interactive chat session, a user
could launch a voice call. Or during a voice call, a user could suddenly
LTE/EPS Technology

12
establish a simultaneous video connection or start transferring files. While
browsing the Web, a user could decide to speak to a customer-service
representative. IMS will be a key platform for all-IP architectures for both
HSPA and LTE.
Another important new service is support for mobile TV through what is
called multicast or broadcast functions. 3GPP has defined multicast/broadcast
capabilities for both HSPA and LTE.
HSPA+ HSPA+ HSPA+ HSPA+
OFDMA systems have attracted considerable attention through technologies
such as 3GPP LTE and WiMAX. However, as already discussed earlier,
CDMA approaches can match OFDMA approaches in reduced channel
bandwidths. The goal in evolving HSPA is to exploit available radio
technologies, enabled by increases in digital signal processing power, to
maximize CDMA-based radio performance. This not only makes HSPA
competitive, it significantly extends the life of sizeable operator infrastructure
investments.
Wireless and networking technologists have defined a series of enhancements
for HSPA, some of which are specified in R7 and some of which are being
studied for R8.
HSPA+ features:
Advanced receivers (type 1, 2, 3, 3i)
MIMO (2x2)
Continuous Packet Connectivity (CPC)
Higher order modulation (64QAM DL, 16QAM UL)
Flatter architecture
Integrated RNC/Node B
Robust Header Compression (ROHC)

Figure 1-2 HSPA+ features
1 Introduction
13
Advancedreceivers Advancedreceivers Advancedreceivers Advancedreceivers
One important area is advanced receivers, where 3GPP has specified a
number of advanced designs. These designs include Type 1, which uses
mobile Rx diversity; Type 2, which uses channel equalization; and Type 3,
which includes a combination of Rx diversity and channel equalization. Type
3i devices will employ interference cancellation. Note that the different types
of receivers are release-independent. For example, Type 3i receivers will
work and provide a capacity gain in a R5 network.
The first approach is mobile Rx diversity. This technique relies on the optimal
combination of received signals from separate receiving antennas. The
antenna spacing yields signals that have somewhat independent fading
characteristics. Hence, the combined signal can be more effectively decoded,
which results in an almost doubling of downlink capacity when employed in
conjunction with techniques such as channel equalization. Receive diversity is
effective even for small devices such as PC card modems and smartphones.
Current receiver architectures based on rake receivers are effective for speeds
up to a few megabits per second. But at higher speeds, the combination of
reduced symbol period and multipath interference results in inter-symbol
interference and diminishes rake receiver performance. This problem can be
solved by advanced receiver architectures with channel equalizers that yield
additional capacity gains over HSDPA with receive diversity. Alternate
advanced receiver approaches include interference cancellation and
generalized rake receivers (G-Rake). Different vendors are emphasizing
different approaches. However, the performance requirements for advanced-
receiver architectures are specified in 3GPP R6. The combination of mobile
Rx diversity and channel equalization (Type 3) is especially attractive,
because it results in a large capacity gain independent of the radio channel.
What makes such enhancements attractive is that the networks do not require
any changes other than increased capacity within the infrastructure to support
the higher bandwidth. Moreover, the network can support a combination of
devices, including both earlier devices that do not include these enhancements
and later devices that do. Device vendors can selectively apply these
enhancements to their higher performing devices.
MIMO MIMO MIMO MIMO
Another standardized capability is Multiple Input Multiple Output (MIMO), a
technique that employs multiple transmit antennas and multiple receive
antennas, often in combination with multiple radios and multiple parallel data
streams. The most common use of the term MIMO applies to spatial
multiplexing. The transmitter sends different data streams over each antenna.
LTE/EPS Technology

14
Whereas multipath is an impediment for other radio systems, MIMO actually
exploits multipath, relying on signals to travel across different
communications paths. This results in multiple data paths effectively
operating somewhat in parallel and, through appropriate decoding, in a
multiplicative gain in throughput.
UE Node B

Figure 1-3 MIMO (2x2)
Tests of MIMO have proven very promising in WLANs operating in relative
isolation, where interference is not a dominant factor. Spatial multiplexing
MIMO should also benefit HSPA hotspots serving local areas such as
airports, campuses, and malls, where the technology will increase capacity
and peak data rates. However, in a fully loaded network with interference
from adjacent cells, overall capacity gains will be more modest - in the range
of 20 to 33 percent over mobile Rx diversity. Relative to a 1x1 antenna
system, however, 2x2 MIMO can deliver cell throughput gains of about 80
percent. 3GPP has standardized spatial multiplexing MIMO in R7.
Although MIMO can significantly improve peak rates, other techniques such
as Space Division Multiple Access (SDMA) - also a form of MIMO - may be
even more effective than MIMO for improving capacity in high spectral
efficiency systems using a reuse factor of 1.
CPC CPC CPC CPC
In R7, Continuous Packet Connectivity (CPC) enhancements reduce the
uplink interference created by the DPCCHs of packet data users when those
users have no data to transmit. This, in turn, increases the number of
simultaneously connected HSUPA users. CPC allows both discontinuous
uplink transmission and discontinuous downlink reception, where the mobile
1 Introduction
15
can turn off its receiver after a certain period of HSDPA inactivity. CPC is
especially beneficial to VoIP on the uplink, which consumes the most power,
because the radio can turn off between VoIP packets.
Higherordermodulation Higherordermodulation Higherordermodulation Higherordermodulation
Another way of increasing performance is to use higher order modulation.
HSPA uses 16 QAM or QPSK on the downlink and QPSK on the uplink. But
radio links can achieve higher throughputs, adding 64 QAM on the downlink
and 16 QAM on the uplink. Higher order modulation requires a better SNR,
which is enabled through other enhancements such as receive diversity and
equalization.
Flatterarch Flatterarch Flatterarch Flatterarchitecture itecture itecture itecture
Another way HSPA performance can be improved is through a flatter
architecture. In R7 there is the option of a one-tunnel architecture by which
the network establishes a direct transfer path for user data between RNC and
GGSN, while the SGSN still performs all control functions. This brings
several benefits such as eliminating hardware in the SGSN and simplified
engineering of the network.
Node B
SGSN
RNC
GGSN
Node B
SGSN
RNC
GGSN
Node B
SGSN
GGSN
control plane
user plane

Figure 1-4 HSPA+ possible architectures
LTE/EPS Technology

16
IntegratedRNC/NodeB IntegratedRNC/NodeB IntegratedRNC/NodeB IntegratedRNC/NodeB
There is also an integrated RNC/NodeB option where RNC functions are
integrated in the Node B. This is particularly beneficial in femtocell
deployments, as an RNC would otherwise need to support thousands of
femtocells. The integrated RNC/NodeB for HSPA+ has been agreed as an
optional architecture alternative for packet-switched based services. Support
of circuit-switched services in HSPA+ must be deployed using the traditional
hierarchical architecture.
These new architectures, are similar to the EPS architecture, especially on the
packet-switched core network side where they provide synergies with the
introduction of LTE.
ROHC ROHC ROHC ROHC
The size of the full IPv6 header together with Real-time Transport Protocol /
User Datagram Protocol (RTP/UDP) header is 60 bytes, while the size of a
typical voice packet is 30 bytes. Without header compression two-thirds of
the transmission would be just headers. IP header compression can be applied
to considerably improve the efficiency of VoIP traffic is HSPA.
Robust Header Compression (ROHC) is a standardized method to compress
the IP, UDP, RTP, and TCP headers of IP packets. This compression scheme
differs from other compression schemes such as IETF RFC 1144 and RFC
2508 by the fact that it performs well over links where the packet loss rate is
high, such as wireless links.
The ROHC in the 3GGP is a part of R4. With ROHC, the required data rate
for VoIP is reduced from close to 40 kbps down to below 16 kbps.
HSPA+capabilities HSPA+capabilities HSPA+capabilities HSPA+capabilities
Depending on the features implemented, HSPA+ can exceed the capabilities
of IEEE 802.16e-2005 (mobile WiMAX) in the same amount of spectrum.
This is mainly because HSPA MIMO supports closed-loop operation with
precode weighting, as well as multicode word MIMO, and enables the use of
SIC receivers. It is also partly because HSPA supports Incremental
Redundancy (IR) and has lower overhead than WiMAX.
1 Introduction
17
peak data rate
11.5 Mbps 42.2 Mbps HSPA+ R8 2x2MIMO/64QAM/16QAM
11.5 Mbps 28.0 Mbps HSPA+ R7 2x2MIMO/16QAM/16QAM
11.5 Mbps 21.1 Mbps HSPA+ R7 64QAM/16QAM
5.76 Mbps 14.4 Mbps HSPA R6
UL DL
technology
peak data rate
11.5 Mbps 42.2 Mbps HSPA+ R8 2x2MIMO/64QAM/16QAM
11.5 Mbps 28.0 Mbps HSPA+ R7 2x2MIMO/16QAM/16QAM
11.5 Mbps 21.1 Mbps HSPA+ R7 64QAM/16QAM
5.76 Mbps 14.4 Mbps HSPA R6
UL DL
technology

Figure 1-5 HSPA+ capabilities
HSPA+ will also more than double HSPA capacity as well as reduce latency
below 25 ms. Sleep to data-transfer times of less than 200 ms will improve
users always-connected experience, and reduced power consumption with
VoIP will result in talk times that are more than 50% higher.
From a deployment point of view, operators will be able to introduce HSPA+
capabilities through either a software upgrade or hardware expansions to
existing cabinets to increase capacity.
LTE/ LTE/ LTE/ LTE/E EE E- -- -UTRAN UTRAN UTRAN UTRAN
Although HSPA and HSPA+ offer a highly efficient broadband-wireless
service, 3GPP is working on a project called Long Term Evolution (LTE) as
part of R8. LTE will allow operators to achieve even higher peak throughputs
in higher spectrum bandwidth. Work on LTE began in 2004, with an official
work item started in 2006 and a completed specification expected in early
2008. Initial possible deployment is targeted for 2009.
RequirementsfortheLTEsystem RequirementsfortheLTEsystem RequirementsfortheLTEsystem RequirementsfortheLTEsystem
LTE is focusing on optimum support of Packet Switched (PS) services. Main
requirements for the design of an LTE system were identified in the beginning
of the standardisation work on LTE and have been captured in 3GPP TR
25.913. They can be summarized as follows:
Data rate: Peak data rates target 100 Mbps DL and 50 Mbps UL for
20 MHz spectrum allocation, assuming 2 receive antennas and 1
transmit antenna at the terminal (these requirement values are already
exceeded by the current LTE specification),
LTE/EPS Technology

18
Throughput & spectrum efficiency: Target for downlink average
user throughput per MHz and for spectrum efficiency is 3-4 times
better than release 6. Target for is 2-3 times better than release 6.
Latency: The one-way transit time between a packet being available
at the IP layer in either the UE or radio access network and the
availability of this packet at IP layer in the radio access network/UE
shall be less than 5 ms. Also C-plane latency shall be reduced, e.g. to
allow fast transition times of less than 100 ms from camped state to
active state.
Channel bandwidth: Scalable bandwidths of 5, 10, 15, 20 MHz shall
be supported. Also bandwidths smaller than 5 MHz shall be supported
for more flexibility, i.e. 1.4 MHz and 3 MHz.
Interworking: Interworking with existing UTRAN/GERAN systems
and non-3GPP systems shall be ensured. Multimode terminals shall
support handover to and from UTRAN and GERAN as well as inter-
RAT measurements. Interruption time for handover between E-
UTRAN and UTRAN/GERAN shall be less than 300 ms for real time
services and less than 500 ms for non real time services.
Multimedia Broadcast Multicast Services (MBMS): MBMS shall
be further enhanced and is then referred to as E-MBMS.
Costs: Reduced CAPEX and OPEX including backhaul shall be
achieved. Cost effective migration from release 6 UTRA radio
interface and architecture shall be possible. Reasonable system and
terminal complexity, cost and power consumption shall be ensured.
All the interfaces specified shall be open for multi-vendor equipment
interoperability.
Mobility: The system should be optimized for low mobile speed (0-15
km/h), but higher mobile speeds shall be supported as well including
high speed train environment as special case.
Spectrum allocation: Operation in paired (Frequency Division
Duplex / FDD mode) and unpaired spectrum (Time Division Duplex /
TDD mode) is possible.
Co-existence: Co-existence in the same geographical area and
collocation with GERAN/UTRAN shall be ensured. Also, co-
existence between operators in adjacent bands as well as cross-border
coexistence is a requirement.
Quality of Service: End-to-end Quality of Service (QoS) shall be
supported. VoIP should be supported with at least as good radio and
1 Introduction
19
backhaul efficiency and latency as voice traffic over the UMTS circuit
switched networks
Network synchronization: Time synchronization of different network
sites shall not be mandated.
data rate: DL 100 Mbps & UL 50 Mbps (already exceeded),
throughput & spectrum efficiency: DL 3-4 x R6, UL 2-3 x R6),
channel bandwidth (5, 10, 15, 20 MHz and smaller),
interworking (GERAN/UTRAN and non-3GPP),
MBMS,
cost reduction,
mobility (optimised for low speeds 0-15 km/h),
spectrum allocation (FDD & TDD),
QoS,
time synchronisation between sites not mandatory.

Figure 1-6 Requirements for the LTE system
LTEtechnologyoverview LTEtechnologyoverview LTEtechnologyoverview LTEtechnologyoverview
LTE uses OFDMA on the downlink, which is well suited to achieve high peak
data rates in high spectrum bandwidth. WCDMA radio technology is basically
as efficient as OFDM for delivering peak data rates of about 10 Mbps in 5
MHz of bandwidth. However, achieving peak rates in the 100 Mbps range
with wider radio channels would result in highly complex terminals, and it is
not practical with current technology. This is where OFDM provides a
practical implementation advantage. Scheduling approaches in the frequency
domain can also minimize interference, thereby boosting spectral efficiency.
approach is also highly flexible in channelization, and LTE will operate in
various radio channel sizes ranging from 1.25 to 20 MHz.
On the uplink, however, a pure OFDMA approach results in high Peak to
Average Ratio (PAR) of the signal, which compromises power efficiency and,
ultimately, battery life. Hence, LTE uses an approach called SC-FDMA,
which is somewhat similar to OFDMA but has a 2 to 6 dB PAR advantage
over the OFDMA method used by other technologies such as IEEE 802.16e.
LTE/EPS Technology

20
LTE capabilities include:
Downlink peak data rates up to 326 Mbps with 20 MHz bandwidth.
Uplink peak data rates up to 86.4 Mbps with 20 MHz bandwidth.
Operation in both TDD and FDD modes.
Scalable bandwidth up to 20 MHz, covering 1.25, 2.5, 5, 10, 15, and
20 MHz. Channels that are 1.6 MHz wide are under consideration for
the unpaired frequency band, where a TDD approach will be used.
Increased spectral efficiency over R6 HSPA by a factor of two to four.
Reduced latency, to 10 ms RTT between user equipment and the
eNodeB, and to less than 100 ms transition time from inactive to
active.
The overall intent is to provide an extremely high-performance radio-access
technology that offers full vehicular speed mobility and that can readily
coexist with HSPA and earlier networks. Because of scalable bandwidth,
operators will be able to easily migrate their networks and users from HSPA
to LTE over time.
peak data rate
86.4 Mbps 326.4 Mbps 4x4 MIMO/64QAM
57.6 Mbps 172.8 Mbps 2x2 MIMO/16QAM
UL DL
LTE configuration
peak data rate
86.4 Mbps 326.4 Mbps 4x4 MIMO/64QAM
57.6 Mbps 172.8 Mbps 2x2 MIMO/16QAM
UL DL
LTE configuration

Figure 1-7 LTE bitrates (20 MHz channel)
OFDM OFDM OFDM OFDM
Orthogonal Frequency Division Multiplexing (OFDM) uses a large number of
narrow sub-carriers for multi-carrier transmission. The basic LTE downlink
physical resource can be seen as a time-frequency grid, as illustrated in
Fig 1-6. In the frequency domain, the spacing between the subcarriers, f, is
15 kHz. The number of subcarriers ranges from 75 in a 1.25 MHz channel to
1,200 in a 20 MHz channel. In addition, the OFDM symbol duration time is
1/f + cyclic prefix. The cyclic prefix is used to maintain orthogonally
between the sub-carriers even for a time-dispersive radio channel.
One resource element carries QPSK, 16QAM or 64QAM. With 64QAM, each
resource element carries six bits.
1 Introduction
21
The OFDM symbols are grouped into resource blocks. The resource blocks
have a total size of 180 kHz in the frequency domain and 0.5 ms in the time
domain. Each 1ms TTI consists of two slots (Tslot).
Each user is allocated a number of so-called resource blocks in the time
frequency grid. The more resource blocks a user gets, and the higher the
modulation used in the resource elements, the higher the bit-rate.
Which resource blocks and how many the user gets at a given point in time
depend on advanced scheduling mechanisms in the frequency and time
dimensions. The scheduling mechanisms in LTE are similar to those used in
HSPA, and enable optimal performance for different services in different
radio environments.
f
t
12 subcarriers, 180 kHz
O
n
e

s
l
o
t
(
T
s
l
o
t
=

0
.
5

m
s
,

7

O
F
D
M

s
y
m
b
o
l
s
)
Resource block
(12 x 7 = 84 resource elements)
Resource element
QPSK 2 bits,
16QAM 4 bits,
64QAM 6 bits,
15 kHz

Figure 1-8 OFDMA concept
The basic principle of OFDM is to split a high-rate data stream into a number
of parallel low-rate data streams, each a narrowband signal carried by a
subcarrier. The different narrowband streams are generated in the frequency
domain and then combined to form the broadband stream using a
mathematical algorithm called an Inverse Fast Fourier Transform (IFFT) that
is implemented in DSPs.
By having control over which subcarriers are assigned in which sectors, LTE
can easily control frequency reuse. By using all the subcarriers in each sector,
the system would operate at a frequency reuse of 1; but by using a different
one third of the subcarriers in each sector, the system achieves a looser
frequency reuse of 1/3. The looser frequency reduces overall spectral
efficiency but delivers high peak rates to users.
In the uplink, LTE uses a pre-coded version of OFDM called Single Carrier
Frequency Division Multiple Access (SC-FDMA). This is to compensate for a
LTE/EPS Technology

22
drawback with normal OFDM, which has a very high PAR. High PAR
requires expensive and inefficient power amplifiers with high requirements on
linearity, which increases the cost of the terminal and drains the battery faster.
SC-FDMA solves this problem by grouping together the resource blocks in
such a way that reduces the need for linearity, and so power consumption, in
the power amplifier. A low PAR also improves coverage and the cell-edge
performance.
Advancedantennas Advancedantennas Advancedantennas Advancedantennas
Advanced antenna solutions that are introduced in HSPA+ are also used by
LTE. Solutions incorporating multiple antennas meet next-generation mobile
broadband network requirements for high peak data rates, extended coverage
and high capacity.
Advanced multi-antenna solutions are key components to achieve these
targets. There is not one antenna solution that addresses every scenario.
Consequently, a family of antenna solutions is available for specific
deployment scenarios. For instance, high peak data rates can be achieved with
multi-layer antenna solution such as 2x2 or 4x4 MIMO whereas extended
coverage can be achieved with beam-forming.
Protocols Protocols Protocols Protocols
The LTE physical layer solely provides shared channels to the higher layers
using a 1 ms TTI. LTE relies on rapid adaptation to channel variations,
employing rate adaptation and HARQ with soft-combining in much the same
way as is done in HSPA. The use of OFDM and SC-FDMA makes it possible
to exploit variations in both the frequency and time domains.
The architecture of the radio interface protocol is based on that for HSPA.
The names of the protocols are the same, in fact, and the functions are similar.
Some distinctions stem from differences in the multiple access techniques of
LTE and HSPA. Others relate to the fact that LTE is a packet-only system
(that is, there are no requirements to support the legacy circuit-switched
domain). Fig. 1-8 and Fig. 1-9 show the architecture of the LTE radio
interface protocol. Note: Apart from the NAS protocols, all radio interface
protocols terminate in the eNodeB on the network side.
Packet Data Convergence Protocol (PDCP) handles the header compression
and security functions of the radio interface; the Radio Link Control (RLC)
protocol focuses on lossless transmission of data; and the Media Access
Control (MAC) protocol handles uplink and downlink scheduling and HARQ
signalling. Similarly, the Radio Resource Control (RRC) protocol handles
radio bearer setup, active mode mobility management, and broadcasts of
1 Introduction
23
system information, while the NAS protocols deal with idle mode mobility
management and service setup.
IP
PDCP
RLC
MAC
PHY
UE
RLC
MAC
PHY
eNode B
PDCP
IP
GW
IP

Figure 1-9 LTE protocols (user plane)
NAS
RRC
RLC
MAC
PHY
UE
RLC
MAC
PHY
eNode B
RRC
NAS
MME
PDCP PDCP

Figure 1-10 LTE protocols (control plane)
The RTT for E-UTRAN is around 7 ms, one way delay 3,5 ms and HARQ
RTT 5 ms.
UE eNode B
1 ms 1.5 ms 1 ms
1 ms 1 ms 1.5 ms
TTI + frame
alignment
HARQ RTT 5 ms

Figure 1-11 LTE user plane delay
LTE/EPS Technology

24
EPS/SAE EPS/SAE EPS/SAE EPS/SAE
3GPP is defining EPS (previously called SAE) in R8 as a framework for an
evolution of the 3GPP system to a higher-data-rate, lower-latency packet-
optimized system that supports multiple radio-access technologies. The focus
of this work is on the PS domain, with the assumption that the system will
support all services - including voice - in this domain.
Although it will most likely be deployed in conjunction with LTE, EPS could
also be deployed for use with HSPA+, where it could provide a stepping-
stone to LTE. EPS will be optimized for all services to be delivered via IP in a
manner that is as efficient as possible - through minimization of latency
within the system, for example. It will support service continuity across
heterogeneous networks, which will be important for LTE operators that must
simultaneously support GSM/GPRS/EDGE/UMTS/HSPA customers.
One important performance aspect of EPS is a flatter architecture. For packet
flow, EPS includes two network elements, called Evolved Node B (eNodeB)
and the Access Gateway (AGW). The eNode B (base station) integrates the
functions traditionally performed by the RNC, which previously was a
separate node controlling multiple Node Bs. Meanwhile, the AGW integrates
the functions traditionally performed by the SGSN. The AGW has both
control functions, handled through the Mobility Management Entity (MME),
and user plane (data communications) functions. The user plane functions
consist of two elements: a serving gateway that addresses 3GPP mobility and
terminates eNode B connections, and a Packet Data Network (PDN) gateway
that addresses service requirements and also terminates access by non-3GPP
networks.
The MME, serving gateway, and PDN gateways can be collocated in the same
physical node or distributed, based on vendor implementations and
deployment scenarios. The EPS architecture is similar to the HSPA One-
Tunnel Architecture, discussed in the HSPA+ section, which allows for
easy integration of HSPA networks to the EPS. EPS also allows integration of
non-3GPP networks such as WiMAX. EPS will use IMS as a component. It
will also manage QoS across the whole system, which will be essential for
enabling a rich set of multimedia-based services.
Elements of the EPS architecture include:
Support for legacy GERAN and UTRAN networks connected via
SGSN.
Support for new radio-access networks such as LTE.
1 Introduction
25
The Serving Gateway that terminates the interface toward the 3GPP
radio-access networks.
The PDN gateway that controls IP data services, does routing,
allocates IP addresses, enforces policy, and provides access for non-
3GPP access networks.
The MME that supports UE context and identity as well as
authenticates and authorizes users.
The Policy Control and Charging Rules Function (PCRF) that
manages QoS aspects.
AGW
LTE
eNode B
PDN GW
Serving GW
HSS
PCRF
IP networks /
IMS / services
WCDMA/
HSPA
GSM
non-3GPP
access
SGSN
MME

Figure 1-12 EPS / SAE architecture
IMS IMS IMS IMS
IMS is a service platform that allows operators to support IP multimedia
applications. Potential applications include video sharing, PoC, VoIP,
streaming video, interactive gaming, and so forth. IMS by itself does not
provide all these applications. Rather, it provides a framework of application
servers, subscriber databases, and gateways to make them possible. The exact
services will depend on cellular operators and application developers that
make these applications available to operators.
The core networking protocol used within IMS is Session Initiation Protocol
(SIP), which includes the companion Session Description Protocol (SDP)
used to convey configuration information such as supported voice codecs.
LTE/EPS Technology

26
Other protocols include Real-time Transport Protocol (RTP) and Real Time
Streaming Protocol (RTSP) for transporting actual sessions. The QoS
mechanisms in UMTS is an important component of some IMS applications.
Although originally specified by 3GPP, numerous other organizations around
the world are supporting IMS. These include the Internet Engineering
Taskforce (IETF), which specifies key protocols such as SIP, and the Open
Mobile Alliance (OMA), which specifies end-to-end service-layer
applications. Other organizations supporting IMS include the GSM
Association (GSMA), the ETSI, CableLabs, The Parlay Group, the ITU, the
American National Standards Institute (ANSI), the Telecoms and Internet
converged Services and Protocols for Advanced Networks (TISPAN), and the
Java Community Process (JCP).
IMS is relatively independent of the radio-access network and can, and likely
will, be used by other radio-access networks or even by wireline networks.
As shown in Fig. 1-13, IMS operates just outside the packet core.
Call Session Control Function (CSCF)
(SIP proxy)
HSS
Media Gateway
Control Function
Media Resource
Function (MRF)
SIP
Application
Server (AS)
IMS
DSL
3GPP CN
WiFi

Figure 1-13 IMS architecture
The benefits of using IMS include handling all communication in the packet
domain, tighter integration with the Internet, and a lower cost infrastructure
that is based on IP building blocks and common between voice and data
services. This allows operators to potentially deliver data and voice services at
lower cost, thus providing these services at lower prices and further driving
demand and usage.
IMS applications can reside either in the operators network or in third-party
networks, including enterprises. By managing services and applications
centrally, and independently of the access network, IMS can enable network
convergence. This allows operators to offer common services across 3G,
WiFi, and even wireline networks.
2 Architecture
27
Chapter Chapter Chapter Chapter2 22 2
Architecture Architecture Architecture Architecture
Topic Topic Topic Topic Page Page Page Page
Non-roaming architecture ................................................................................ 29
Roaming architecture....................................................................................... 37
Arch. for non-3GPP access .............................................................................. 39
Interfaces.......................................................................................................... 41
Geographical network structure....................................................................... 43
Identities........................................................................................................... 45
LTE/EPS Technology

28

This page is intentionally left blank
2 Architecture
29
Non Non Non Non- -- -roamingarchitecture roamingarchitecture roamingarchitecture roamingarchitecture
Fig. 2-1 describes the overall Evolved Packet System (EPS) architecture, not
only including the Evolved Packet Core (EPC) and Evolved UMTS
Terrestrial Radio Access Network (E-UTRAN), but also other blocks, in order
to show the relationship between them.
UTRAN
E-UTRAN
P-GW S-GW
PCRF
S1-U
S1-MME
S11
S5
S10
S6a
EIR
S13
S4
S12
Operators
IP
Services
(e.g. IMS,
PSS, etc.)
SGi
Gx
Rx
L
T
E
-
U
u
GERAN
red colour indicates new
functional element
red colour indicates new
functional element
UE
S3
MME
HSS
S6b
SGSN
Sv
SGs
MSC
MME
Sv

Figure 2-1 Evolved Packet System (EPS) architecture
EPC EPC EPC EPC
The Evolved Packet Core (EPC) network is composed of several new
functional entities:
Mobility Management Entity (MME),
Serving Gateway (S-GW),
Packet Data Network (PDN) Gateway (P-GW).
The EPC makes also use of the existing 2G GSM/3G UMTS network nodes,
namely:
Home Location Register (HLR),
Equipment Identity Register (EIR),
Policy and Charging Rules Function (PCRF).
LTE/EPS Technology

30
Some additional nodes are also required for interworking with other (non
LTE) radio access technologies. Example of such node is SGSN that is used
for interworking with GERAN and UTRAN.
MME MME MME MME
The Mobility Management Entity (MME) is in charge of all control plane
functions related to subscriber and session management. From that
perspective, the MME supports as follows:
Non-access Stratum Signalling (NAS) i.e. signalling between UE and
the Evolved Packet Core (EPC) network this relates to all signalling
procedures related with terminal location management (tracking area
update procedure) and procedures used to setup a packet data context
(connection for user data) and negotiate associated parameters like
Quality of Service (QoS).
Inter Core Network (CN) node signalling for handling mobility
between different types of 3GPP access networks, i.e. signalling with
SGSN exchanged over S3 interface.
Security procedures this relates to end-user authentication, end-user
equipment check, as well as initiation and negotiation of ciphering and
integrity protection algorithms.
Tracking Area (TA) list management.
Idle UE reachability, e.g. control and execution of paging
transmission.
Selection of other CN nodes:
o S-GW and PDN-GW for the purpose of user data transmission,
o MME for handovers with MME change,
o SGSN for handovers to GERAN or UTRAN.
Roaming, i.e. MME handles interface toward subscribers HPLMN
HLR.
The MME is linked through the S6a interface to the HSS which supports the
database containing all the user subscription information.
2 Architecture
31
Gateways Gateways Gateways Gateways
Two logical Gateways exist:
Serving GW (S-GW),
PDN GW (P-GW).
The P-GW and the S-GW may be implemented in one physical node or
separated physical nodes.
MME
E-UTRAN
P-GW S-GW
S1-U
S1-MME
S11
IP/IMS
SGi
S6a
HSS

Figure 2-2 S-GW and P-GW in one physical node
Also the S-GW and the MME may be implemented in one physical node or
separated physical nodes.
MME
E-UTRAN
P-GW S-GW
IP/IMS
SGi
S6a
HSS
S5
S1

Figure 2-3 MME and S-GW in one physical node
S SS S- -- -GW GW GW GW
The Serving Gateway (S-GW) is the gateway which terminates the interface
towards E-UTRAN. For each UE associated with the EPS, at a given point of
time, there is a single S-GW.
The functions of the S-GW, include:
Packet routeing and forwarding,
Transport level packet marking in the uplink and the downlink, e.g.
setting the DiffServe Code Point, based on the QoS Class Identifier
(QCI) of the associated EPS bearer,
Downlink packet buffering and initiation of network triggered
service request procedure for Idle UEs,
LTE/EPS Technology

32
The local mobility anchor point for inter-eNodeB handover and
assistance in packet reordering during inter-eNodeB handover,
Mobility anchoring for inter-3GPP mobility (relaying the traffic
between 2G/3G system and P-GW,
Charging and accounting,
Lawful interception.
P PP P- -- -GW GW GW GW
The PDN GW is the gateway which terminates the SGi interface towards the
PDN. If a UE is accessing multiple PDNs, there may be more than one PDN
GW for that UE.
PDN GW functions include:
Transport level packet marking in the uplink and the downlink,
UE IP address allocation,
Per-user based packet filtering (by e.g. deep packet inspection),
UL and DL service level charging ,
UL and DL service level rate enforcement,
UL and DL service level gating control,
Lawful Interception,
DHCP functions,
SGSN SGSN SGSN SGSN
The Serving GPRS Support Node (SGSN), in addition to the functions
handled earlier in 2G/3G network, is responsible for:
Inter EPC node signalling for mobility between 2G/3G and E-
UTRAN,
PDN and Serving GW selection,
MME selection for handovers to E-UTRAN.
PCRF PCRF PCRF PCRF
The Policy and Charging Rules Function (PCRF). PCRF functions are
described in more detail later in this book.
2 Architecture
33
HSS HSS HSS HSS
The Home Subscriber Server (HSS) is the concatenation of the Home
Location register (HLR) and the Authentication Centre (AuC) two functions
being already present in 2G GSM and 3G UMTS networks. The HLR part of
the HSS is in charge of storing and updating when necessary the database
containing all the user subscription information, including:
user identification and addressing this corresponds to the
International Mobile Subscriber Identity (IMSI) and Mobile
Subscriber ISDN Number (MSISDN),
user profile information this includes service subscription states and
user-subscribed Quality of Service (QoS) information (such as
maximum allowed bit rate or allowed traffic class),
The AuC part of the HSS is in charge of generating security information from
user identity keys. This security information is provided to the HLR and
further communicated to other entities in the network. Security information is
mainly used for:
mutual network-terminal authentication,
radio path ciphering and integrity protection, to ensure data and
signalling transmitted between network and the terminal is neither
eavesdropped nor altered.
Introduced from the very beginning of the GSM network standardisation,
HLR and AuC boxes were eventually joined together in a single HSS node as
IMS was defined by the 3GPP. In its extended role, the HSS of Evolved
UMTS networks integrates both HLR and AuC features, including classical
MAP features (for support of CS and PS sessions), IMS-related functions, and
all necessary functions related to the new EPC.
2G/3G PS domain 2G/3G CS domain
IMS
EPC
HLR
AUC
HSS
I/S-CSCF
GMSC
VLR SGSN
GGSN
MME
S6a
Gc
S6b
Gr
Cx
C
D

Figure 2-4 HSS structure and external interfaces
LTE/EPS Technology

34
There are actually three main cases in which the HSS is actively involved:
At user registration the HSS is interrogated by the corresponding CN
node as the user attempts to register to the network in order to check
the user subscription rights. This can be done by either the MSC, the
SGSN, I-CSCF or the MME, depending on the type of network and
registration being requested;
In the case of terminal location update as the terminal changes
location areas, the HSS is kept updated and maintains a reference of
the last known are;
In the case of user-terminated session request the HSS is
interrogated and provides a reference of the CN node corresponding to
the current user location.
E EE E- -- -UTRAN UTRAN UTRAN UTRAN
Coming back to the first releases of the UMTS standard, the UTRAN
architecture was initially very much aligned with GSM access network
(GERAN) concepts. As described in Fig. 2-5, the UTRAN network is
composed of the radio equipment (known as NodeB or Base Station) in
charge of transmission and reception over the radio interface, and the Radio
Network Controller (RNC) in charge of NodeB configuration and radio
resource allocation. A single RNC may possibly control a large number of
NodeBs over the Iub interface.
In addition, an inter-RNC Iur interface was defined to allow UTRAN call
anchoring at the RNC level and macro-diversity between different NodeBs
controlled by different RNCs. Macro-diversity was a consequence of
CDMA-based UTRAN physical layer, as means to reduce radio interference
and preserve network capacity. The initial UTRAN architecture resulted in a
simplified NodeB implementation, and a relatively complex, sensitive, high-
capacity and feature-rich RNC design. In this model, the RNC had to support
resources and traffic management features as well as a significant part of the
radio protocols. Compared with UTRAN, the E-UTRAN OFDM-based
structure is quite simple. It is only composed of one network element: the
evolved NodeB (eNodeB).
2 Architecture
35
Core Network
Iur
Iub Iub
Iu Iu
RNC RNC
Iub Iub
NodeB NodeB
NodeB
NodeB
Core Network
X2
S1
eNodeB
eNodeB
S1
UTRAN E-UTRAN

Figure 2-5 UTRAN and E-UTRAN architectures
The 3G RNC inherited from the 2G BSC has disappeared from E-UTRAN
and the eNodeB is directly connected to the Core Network (CN) using S1
interface. As a consequence, the features supported by the RNC have been
distributed between the eNodeB and the CN entities.
An eNodeB can be implemented either as a single-cell equipment providing
coverage and services in one cell only, or as a multi-cell node, where each cell
is covering a given geographical sector.
omnidirectional eNodeB sectorised eNodeB

Figure 2-6 Omnidirectional and sectorised eNodeBs
A new X2 interface has been defined between eNodeBs, working in a meshed
way (meaning that all NodeBs may possibly be linked together). The main
purpose of this interface is to minimise packet loss due to user mobility. As
the terminal moves across the access network, unsent or unacknowledged
packets stored in the old eNodeB queues can be forwarded to the new eNodeB
thanks to the X2 interface.
LTE/EPS Technology

36
S1
Tx Re-Tx
HO
Tx Re-Tx
X2
Core Network
S1

Figure 2-7 X2 interface
From a high-level perspective, the new E-UTRAN architecture is actually
moving towards WLAN network structures and WiFi or WiMAX base
stations functional definition. eNodeB as WLAN access points support
all L1 and L2 features associated to the E-UTRAN OFDM physical interface,
and they are directly connected to the network routers. There is no more
intermediate controlling node (as the 2G BSC or 3G RNC was).
This has a merit of a simpler network architecture (fewer nodes of different
types, which means simplified network operation) and allows better
performance over the radio interface.
From the functional perspective, the eNodeB supports a set of legacy features,
all related to physical layer procedures for transmission and reception over the
radio interface:
modulation and de-modulation,
channel coding and decoding.
Besides, the eNodeB includes additional features, coming form the fact that
there are no more Base Station controllers in the E-UTRAN architecture:
radio resource control: this relates to the allocation, modification and
release of resources for the transmission over the radio interface
between the user terminal and the eNodeB.
mobility management: this refers to a measurement processing and
handover decision.
full L2 protocol: this refers detection and possibly correction of errors
that may occur in the physical layer (this function in UTRAN was
fully or for some services partially handled by RNC).
2 Architecture
37
Roamingarchitecture Roamingarchitecture Roamingarchitecture Roamingarchitecture
This section describes the case, both the visited and the home networks are
EPC networks. Other cases, i.e. migration routes to this target roaming
architecture are left by 3GPP for further studies. Two alternative architectures
are shown, depending on whether UE traffic has to be routed to the HPLMN
or not.
UsertrafficroutedtotheHPLMN UsertrafficroutedtotheHPLMN UsertrafficroutedtotheHPLMN UsertrafficroutedtotheHPLMN
Fig. 2-8 presents the EPC architecture support for roaming cases. In this
example, a user has subscribed to HPLMN A, but is currently under the
coverage of the VPLMN B. This kind of situation may happen while the user
is travelling to another country, or in case in which a national roaming
agreement has been set up between operators, so as to decrease the investment
effort for national coverage. In such a roaming situation, part of the session is
handled by the VPLMN. This includes E-UTRAN access network support,
session signalling handling by the MME, and user plane routing through the
local S-GW. Thanks to local MME and S-GW, the VPLMN is then able to
built and send charging tickets to the subscriber home operator ,
corresponding to the amount of data transferred and QoS allocated.
UTRAN
SGSN
MME
E-UTRAN
P-GW S-GW
PCRF
S1-U
S1-MME
S11
S8
S10
HSS
S6a
S4 S12
Operators
IP
Services
(e.g. IMS,
PSS, etc.)
SGi
Gx
Rx
L
T
E
-
U
u
GERAN
UE
S3
MME
VPLMN HPLMN

Figure 2-8 Roaming architecture (HPLMN routed traffic)
However, since the terminal user has no subscription with the VPLMN, the
Visited EPC needs to be linked to the HSS of the user home network, at least
to retrieve the user-specific security credential needed for authentication and
ciphering. In the roaming architecture , the session path goes through the
LTE/EPS Technology

38
Home P-GW over the S8 interface, so as to apply policy and charging rules in
the home network corresponding to the users subscription parameters.
The S8 interface is in fact a roaming variant of S5 reference point, to support
both signalling and data transfer between S-GW located in VPLMN and
P-GW located in the HPLMN.
Briefly, in such a model, the VPLMN provides the access connectivity (which
also involves the basic session signalling procedures supported by the Visited
MME, with the support of the Home HSS), whereas the HPLMN still
provides the access to external networks, possibly including IMS-based
services.
Usertrafficnotr Usertrafficnotr Usertrafficnotr UsertrafficnotroutedtotheHPLMN outedtotheHPLMN outedtotheHPLMN outedtotheHPLMN
In the previous model, the call is still anchored to the Home IASA, hence the
home routed traffic denomination. The user packet routing in such a scheme
may, however, be quite inefficient in terms of cost and network resources as
the Home P-GW and Visited S-GW may be very far from each other. This is
the reason why the 3GPP standard also allows the possibility of the user
traffic to be routed via a Visited P-GW, as an optimisation. This may be very
beneficial in the example of public Internet access as routing the traffic to
the HPLMN does not add any value to the end user and even more in the
case of an IMS session established between a roaming user and a subscriber
of the visited network. In the last case, local traffic routing avoids a complete
round trip of user data trough the HPLMN anchors.
Fig. 2-9 and describe possible network architecture in the case where the
traffic is routed locally or the local breakout case. Both gateways are part
of the VPLMN.
Home
Operators
Services
UTRAN
SGSN
MME
E-UTRAN
P-GW S-GW
vPCRF
S1-U
S1-MME
S11
S5
S10
HSS
S6a
S4 S12
Visited
Operators
PDN SGi
Gx
Rx
L
T
E
-
U
u
GERAN
UE
S3
MME
VPLMN HPLMN
hPCRF
S9
Rx

Figure 2-9 Roaming architecture (local breakout)
2 Architecture
39
If the networks make use of PCRF, one of the possible solutions is that the
enforcement of the HPLMN policies (QoS and charging policies) by the
Visited P-GW is performed through the interaction of Home and Visited
PCRF. Possibly, the Visited PCRF may add/modify policies according to
those defined in the VPLMN. The related reference point between PCRFs is
referred as S9.
Arch Arch Arch Arch. .. .fornon fornon fornon fornon- -- -3GPPaccess 3GPPaccess 3GPPaccess 3GPPaccess
A non-3GPP IP Access Network is defined as a trusted non-3GPP IP Access
Network if the 3GPP EPC system chooses to trust such non-3GPP IP access
network. The 3GPP EPC system operator may choose to trust the non-3GPP
IP access network operated by the same or different operators, e.g. based on
business agreements.
Note that specific security mechanisms may be in place between the trusted
non-3GPP IP Access Network and the 3GPP EPC to avoid security threats. It
is assumed that an IPSec tunnel between the UE and the 3GPP EPC is not
required.
On the contrary, an untrusted non-3GPP IP Access Network is an IP access
network where 3GPP network requires use of IPSec between the UE and the
3GPP network in order to provide adequate security mechanism acceptable to
3GPP network operator. An example of such untrusted non-3GPP IP access is
WLAN and it is made trusted in the Interworking WLAN specifications
developed within 3GPP.
In the current standardisation documents, a trusted non-3GPP IP access is also
referred to as the non-3GPP IP access, and an untrusted non-3GPP IP accesses
are accommodated by is also referred to as the WLAN 3GPP IP access.
TrustedNon TrustedNon TrustedNon TrustedNon- -- -3GPPIPAccess 3GPPIPAccess 3GPPIPAccess 3GPPIPAccess
Fig. 2-10 represents the network architecture providing IP connectivity to the
EPC using non-3GPP type of access. This architecture is independent from
the access technology, which could be WiFi, WiMAX or any other kind of
access type. This picture applies to the trusted WLAN access, corresponding
to the situation where the WLAN network is controlled by the operator itself
or by another entity (local operator or service provider) which can be trusted
due to the existence of mutual agreements.
LTE/EPS Technology

40
Trusted
non 3GPP
IP Access
HSS
3GPP AAA
Server
MME
E-UTRAN
PCRF
Operators
IP
(services:
IMS, PSS,
etc)
Wx
Ta
P-GW S2a
S7
SGi
Rx
Non-3GPP
network
3GPP
network
S-GW

Figure 2-10 Trusted Non-3GPP IP Access architecture
As described below, some new network nodes and interfaces are needed to
support non-3GPP access types. In contrast, on terminal side, no changes are
required except some slight software adaptations. This comes from the fact
that Authentication Authorisation and Accounting (AAA) mechanisms for
mutual authentication and access control are based on known IETF protocols
but make use of the 3GPP UICC stored credentials.
The 3GPP AAA Servers role is to act as an inter-working unit between the
3GPP world and IETF standard-driven WLAN networks from the security
perspective. Its purpose is to allow end-to-end authentication with WLAN
terminals using 3GPP credentials. For that reason, the 3GPP AAA Server has
an access to the HSS through Wx interface, so as to retrieve user-related
subscription information and 3GPP authentication vectors.
From the 3GPP AAA Server, the Ta interface has been defined with the
trusted access network, aiming at transporting authentication, authorization
and charging-related information in a secure manner.
From the user plane perspective, the user data are transmitted from the
WLAN to the P-GW through the new S2a interface. As in legacy EPC
architecture, the P-GW still serves as an anchor point for the user traffic.
In such a model, the 3GPP Anchor and MME UPE nodes are not needed any
more. Terminal location management is under the responsibility of the
WLAN Access as well as the packet session signalling and does not need any
support from 3GPP EPC nodes (aside from the provision of 3GPP security
credentials). In the example of a 802.11 WiFi access point, user association
(the process by with a WiFi terminal connects to an access point), security
features as well as radio protocols are handled by the access point itself.
2 Architecture
41
In addition to the trusted model, the standard defines another model, for the
situations where WLAN is untrusted. This model is described in Fig. 2-11. As
an example, this may correspond to a business entity deploying a WLAN for
its internal use and willing to offer 3GPP connectivity to some of its
customers. In such a case, the WLAN-3GPP interconnection looks a bit
different due to additional mechanism to maintain legacy 3GPP infrastructure
security and integrity.
Untrusted
non 3GPP
IP Access
HSS
3GPP AAA
Server
MME
E-UTRAN
PCRF
Operators
IP
(services:
IMS, PSS,
etc)
Wx
Ta
P-GW SGi
Rx
Non-3GPP
network
3GPP
network
S-GW
ePDG Wn
Wm
S2b
S7

Figure 2-11 Untrusted Non-3GPP IP Access architecture
This model introduced a evolved Packet Data Gateway (ePDG) node which
concentrates all the traffic issued or directed to the WLAN network. Its main
role is to establish a secure tunnel for user data transmission with the terminal
using IPSec and filter unauthorised traffic.
In this model, the new Wm interface is introduced for the purpose of
exchanging user-related information from the 3GPP AAA Server to the
ePDG. This will allow the ePDG to enable proper user data tunnelling and
encryption to the terminal.
Interfaces Interfaces Interfaces Interfaces
It is important to note, that the interfaces shown in Fig. 2-1 are logical
interfaces, i.e. they have no close relation with the physical network structure
and transmission. The connectivity between nodes will be handled by IP
network, operating on longer distances on top of SDH transmission network
and possibly on shorter distances on Carrier Ethernet, Gigabit Ethernet or
LTE/EPS Technology

42
even ADSL technologies. In such case the logical interface between two
nodes exist if only they are able to exchange information across IP network.
This means also, that they are aware of their functions and IP addresses,
which are configured either statically by means of O&M commands or
dynamically by means of some signalling protocols.
SGSN
MME
P-GW
S-GW
PCRF
HSS
EIR
eNodeB
eNodeB
P-GW
S-GW
MME
eNodeB

Figure 2-12 Interfaces & connectivity
The protocol stacks used across the EPS interfaces are listed in Fig. 2-13.
Diameter/SCTP/IP P-GW PCRF Gx
GTP-C/UDP/IP MME/SGSN MSC Sv
SGsAP/SCTP/IP MME MSC SGs
Diameter/SCTP/IP SGSN HSS S6b
IP S-GW PDN SGi
S1-AP/SCTP/IP eNB MME S1-MME
Diameter/SCTP/IP PCRF AF Rx
X2-AP/SCTP/IP eNB eNB X2
Diameter/SCTP/IP MME EIR S13
GTP-U/UDP/IP S-GW RNC S12
GTP-C/UDP/IP MME S-GW S11
GTP-C/UDP/IP MME MME S10
Diameter/SCTP/IP vPCRF hPCRF S9
GTP/UDP/IP or PMIP vS-GW hP-GW S8
Diameter/SCTP/IP MME HSS S6a
GTP/UDP/IP or PMIP S-GW P-GW S5
GTP/UDP/IP S-GW SGSN S4
GTP-C/UDP/IP MME SGSN S3
GTP-U/UDP/IP eNB S-GW S1-U
Protocol stack Nodes Interface
Diameter/SCTP/IP P-GW PCRF Gx
GTP-C/UDP/IP MME/SGSN MSC Sv
SGsAP/SCTP/IP MME MSC SGs
Diameter/SCTP/IP SGSN HSS S6b
IP S-GW PDN SGi
S1-AP/SCTP/IP eNB MME S1-MME
Diameter/SCTP/IP PCRF AF Rx
X2-AP/SCTP/IP eNB eNB X2
Diameter/SCTP/IP MME EIR S13
GTP-U/UDP/IP S-GW RNC S12
GTP-C/UDP/IP MME S-GW S11
GTP-C/UDP/IP MME MME S10
Diameter/SCTP/IP vPCRF hPCRF S9
GTP/UDP/IP or PMIP vS-GW hP-GW S8
Diameter/SCTP/IP MME HSS S6a
GTP/UDP/IP or PMIP S-GW P-GW S5
GTP/UDP/IP S-GW SGSN S4
GTP-C/UDP/IP MME SGSN S3
GTP-U/UDP/IP eNB S-GW S1-U
Protocol stack Nodes Interface

Figure 2-13 Protocols on EPS interfaces
2 Architecture
43
Geographicalnetworkstructure Geographicalnetworkstructure Geographicalnetworkstructure Geographicalnetworkstructure
For all mobiles not being in idle mode, location management is still an
important item, as the network needs to know the current terminal location at
any time in case of mobile-terminated session setup or push services.
However, idle mode procedures do not require the network to know each
terminal location with the high degree of accuracy (such as the cell level). For
that reason, the concept of Tracking Area (TA) has been introduced.
Basically, a TA is defined as a set of contiguous cells. The identity of the TA
the cell belongs to, or Tracking Area Identity (TAI), is part of the system
information broadcast on Broadcast Control Channel (BCCH). As in the
3GPP definition, TAs do not overlap each other. When the network needs to
join the terminal, a paging message is sent in all the cells which belong to the
Tracking Area.
The current terminal TA is signalled to the EPC at initial registration and
when UE changes the zones. In addition, the current TA is periodically
updated, even if it does not change, so that the EPC network does not keep
alive a context for a terminal which is no longer reachable in the network.
This can happen if the terminal fails to de-register or runs out of coverage.
As an enhancement to UMTS, the standard leaves the possibility for the
terminal to be registered into multiple TAs. In this situation , the terminal
does not perform any TA update as long as it remains under the coverage of
the TAs it was registered to (like TA1, TA2 and TA3 in Fig. 2-14), with the
exception of periodic TA update. This multi-TA registration mechanism helps
to reduce the number of TA updates that the network has to process for
terminals located at the edge of TAs.
TA#3
TA#7
TA#8
TA#9
TA#1
TA#2
TA#4
TA#5
TA#6
TA update

Figure 2-14 Tracking Area (TA)
LTE/EPS Technology

44
The list of TAs that the UE is registered to is communicated by the network
during the TA update process. The UE considers it is registered to the whole
TA list until it enters a TA which does not belong to the list, or gets an update
list from the network, e.g. on the occasion of periodic TA update.
The concept of location area, such as the TA, is not new to EPS, a sit was
introduced at the beginning of GSM system. Letter on, when GPRS and
UMTS were introduced, this principle become more complex. In UMTS, as
presented in Fig. 2-15, no less than four types of areas are being used:
Location Area (LA), which is a type of area supported by the CS CN
domain,
Routing Area (RA), which is the equivalent of the LA for the PS CN
domain,
UTRAN Registration Area (URA), which is a registration area for the
use of the UMTS access network,
Cell, which provides the best accuracy localisation information.
URA #1 URA #1 URA #1
RA #1
LA #1
RA #2 RA #3 RA #4 RA #5
LA #2 LA #3

Figure 2-15 UMTS location areas
RA is defined in such a way that a LA may include one or more RA. URA
was introduced to provide flexibility in UTRAN terminal location
management, in connection with the protocol states which were introduced in
the UTRAN RRC layer. As it is managed by the UTRAN, URA has no
relation with the CNs LA and RA.
LA and RA are quite similar to the concept of TA, as being a non-overlapping
group of cells. However, the URA concept has no equivalent in E-UTRAN.
The possibility of defining overlapping URA was introduced as a way to
decrease the signalling load impact of URA update, similarly to the TA list
registration concept presented above.
2 Architecture
45
From the perspective of the terminal location management, EPS has been
simplified ,a s there is only one type of CN domain (the EPC) and no
registration area has been defined for the access network like the UTRANs
URA. This will also have an impact on RRC state management simplification.
Identities Identities Identities Identities
Similarly to GSM/UMTS, EPS uses a number of descriptors to identify
subscribers. In Fig. 2-16 the EPS nodes are presented together with the
identities used by these nodes for various identification purposes.
MSISDN
IMSI
IMEI
P-TMSI
UTRAN
SGSN
MME
E-UTRAN
P-GW S-GW
HSS
EIR
GERAN
UE
IMSI IMEI
IMSI IMEI
IMEI
IMSI
IMEI
P-TMSI
PDP
address
IMSI IMEI GUTI
PDP address
PDP
address
GUTI
Static PDP address ?
MSISDN IMSI IMEI

Figure 2-16 EPS identities
IMSI IMSI IMSI IMSI
The unique identity for mobile subscriber is called International Mobile
Subscriber Identity (IMSI). IMSI consists of three parts:
MCC - Mobile Country Code (three digits),
MNC - Mobile Network Code (2-3 digits),
MSIN - Mobile Station Identification (up to 10 digits).
This number is stored on the SIM and acts acts as the unique database search
key in the HSS, MME and SGSN.
LTE/EPS Technology

46
MCC MNC MSIN
National MSI
International MSI

Figure 2-17 IMSI
MSISDN MSISDN MSISDN MSISDN
The Mobile Subscriber Integrated Services Digital Network number
(MSISDN) is a number, which uniquely identifies a mobile telephone
subscription in the public switched telephone network numbering plan. These
are the digits dialled when calling the mobile subscriber. The MSISDN
consists of three parts:
CC - Country Code,
NDC - National Destination Code,
SN - Subscriber Number.
CC NDC SN
National Mobile Number
International Mobile ISDN Number

Figure 2-18 MSISDN
PDPaddress PDPaddress PDPaddress PDPaddress
The Packet Data Protocol (PDP) context address, which is an IP address of
the mobile user. The PDP context address can be dynamical or static. If it is
dynamic, it is created when a packet session is created. If it is static, it has
been defined in the HSS.
IMEI IMEI IMEI IMEI
The International Mobile Equipment Identity (IMEI) is a number uniquely
identifying the user equipment hardware. The EIR stores IMEIs of all mobile
terminals that have been ever present on a market. The IMEIs of terminals
that are free to use any GSM/UMTS/EPS network are present on white list,
whereas the IMEIs of terminals that have been stolen are placed on the black
list.
2 Architecture
47
TAC SNR
IMEI
spare

Figure 2-19 IMEI
TAC - Type Approval Code - Is a 8 digits length code that
identifies the particular type of the mobile equipment.
SNR - Serial Number (6 digits)
Spare - (1 digit)
The IMEI (14 digits) is complemented by a check digit. The check digit is not
part of the digits transmitted when the IMEI is checked. The Check Digit is
intended to avoid manual transmission errors, e.g. when customers register
stolen mobile equipment at the operator's customer care desk.
GUTI,M GUTI,M GUTI,M GUTI,M- -- -TMSIandS TMSIandS TMSIandS TMSIandS- -- -TMSI TMSI TMSI TMSI
The MME allocates a Globally Unique Temporary Identity (GUTI) to the UE.
The GUTI has two main components:
Globally Unique MME Identifier (GUMMEI) uniquely identifying the
MME which allocated the GUTI,
M-TMSI uniquely identifying the UE within the MME that allocated
the GUTI.
GUTI/IMSI IMSI
GUTIIMSI
IMSI
new GUTI
IMSI
GUTI
new GUTI
MME P-GW
HSS
S-GW
eNodeB eNodeB
SGSN

Figure 2-20 Globally Unique Temporary Identity (GUTI)
LTE/EPS Technology

48
GUMMEI is constructed from MCC, MNC and MME Identifier (MMEI).
In turn the MMEI is constructed from an MME Group ID (MMEGI) and an
MME Code (MMEC).
For paging, the mobile is paged with the S-TMSI. The S-TMSI is constructed
from the MMEC and the M-TMSI.
The operator needs to ensure that the MMEC is unique within the MME pool
area and, if overlapping pool areas are in use, unique within the area of
overlapping MME pools.
The GUTI is used to support subscriber identity confidentiality, and, in the
shortened S-TMSI form, to enable more efficient radio signalling procedures.
GUMMEI
MCC MNC MMEGI MMEC M-TMSI
MMEI
S-TMSI

Figure 2-21 GUTI structure
TAI TAI TAI TAI
The Tracking Area Identity (TAI) is the identity used to identify Tracking
Areas (TAs). The Tracking Area Identity is constructed from the MCC, MNC
and Tracking Area Code (TAC).
MCC MNC TAC

Figure 2-22 Tracking Area Identity (TAI)
3 OFDMA & SC-FDMA
49
Chapter Chapter Chapter Chapter3 33 3
OFDMA OFDMA OFDMA OFDMA&SC &SC &SC &SC- -- -FDMA FDMA FDMA FDMA
Topic Topic Topic Topic Page Page Page Page
Introduction...................................................................................................... 51
Fourier transform............................................................................................. 56
Discrete Fourier Transform.............................................................................. 64
Orthogonality of frequencies ........................................................................... 65
Channel separation in FDMA.......................................................................... 67
Channel separation in OFDMA....................................................................... 74
Transmission example ..................................................................................... 76
Implementation ................................................................................................ 78
Advantages and disadvantages ........................................................................ 82
OFDMA........................................................................................................... 92
SC-FDMA........................................................................................................ 92
LTE/EPS Technology

50

This page is intentionally left blank
3 OFDMA & SC-FDMA
51
Introduction Introduction Introduction Introduction
Multiple access in telecommunications systems refers to techniques that
enable multiple users to share limited network resources efficiently. A
telecommunications network has finite resources that are usually defined in
terms of bandwidth. When there is more than one user to access such limited
bandwidth, an multiple access scheme must be put in place to control the
share of bandwidth among multiple users so that everyone can use services
provided by the network and to make sure that no single user spends all
available resources.
From a very early stage of modern communications, researchers have been
working on finding the best multiple access scheme to follow the above
simple rule of resource sharing among multiple users. Very visible and
fundamental ways of sharing bandwidth, frequency and time separation, were
chosen as the beginning of multiple access generation.
FDMA FDMA FDMA FDMA
In the first multiple access communications systems, the available frequency
spectrum for a given system was divided into some frequency channels where
each channel occupies a portion of total available bandwidth and is given to a
single user. Multiple users using separate frequency channels could access the
same system without significant interference from other users concurrently
operating in the system. It is the simplest way of having an scheme in a multi-
user system, and it is referred to as Frequency Division Multiple Access
(FDMA).
time
frequency
f1 f2 f3 f4 f5 f6 f7

Figure 3-1 Frequency Division Multiple Access
LTE/EPS Technology

52
TDMA TDMA TDMA TDMA
With the same concept, Time Division Multiple Access (TDMA) schemes
came to start the digital communications era by dividing the time axis into
portions or time slots, each assigned to a single user to transmit data
information. TDMA schemes thus came into effect through frame and
multiframe concepts: a user could send a large data file within time slots of
periodical frames. Data from a single user always sits in the same time slot
position of a frame, so at the receiver all information from that portion can be
collected and aggregated to shape the original transmitted packet. TDMA,
together with Pulse Code Modulation (PCM), has become an effective way of
sharing the available system resources not only in wireless communications
but in wired communications since then. TDMA has kept its dominance in
wired and wireless systems for many years. Many cellular standards such as
the GSM and GPRS adopted TDMA as their multiple access scheme.
time
frequency
TS 1
TS 2
TS 3
TS 4

Figure 3-2 Time Division Multiple Access
As is clear from the above simple review, in both FDMA and TDMA
techniques the number of channels or time slots is fixed for a given system,
and a single channel is allocated to a single user for the whole period of
communications.
This was not only a concept to have a simple multiple access technique in the
early stage of modern telecommunications, but was based on the dominant
service in mind at the time, voice communications. Having a fixed channel or
time slot assignment could guarantee the service quality for real-time and
constant-bit-rate voice telephony, the main service at that time. By increasing
the number of services from simple voice to more burst data transmissions,
fixed channel assignment has shown its lack of efficiency in utilizing the
scarce spectrum, especially with the exponential increase in number of users.
Researchers started to think of more dynamic channel assignment forms of
TDMA and FDMA that could allocate a channel only when the user wants to
transmit data. While many dynamic channel assignment multiple access
schemes have been invented since then, the fixed upper limit on number of
3 OFDMA & SC-FDMA
53
users in a TDMA or FDMA system has created a demand for new multiple
access schemes with fewer limitations, particularly for mobile
communications.
CDMA CDMA CDMA CDMA
With this idea in mind, Code Division Multiple Access (CDMA) schemes
based on spread spectrum technology started to come into commercial
systems, different from their original environment mainly in military
applications. In a CDMA system the relatively narrowband users information
is spread into a much wider spectrum using a high clock chip rate. Using
different uncorrelated codes by each user, it is possible to send multiple users
information on the same frequency spectrum without significant difficulty in
detecting the desired signal at the receiver side as long as the correct
spreading code is known to the receiver. The signal from each user will have
very low power and be seen by others as background noise. Therefore, as long
as the total power of noise (i.e., multi-user interference) is less than a
threshold, it is possible to detect the desired signal using the spreading code
used to encode the signal at the transmitter. Using spread spectrum
techniques, CDMA has become a dynamic channel allocation multiple access
scheme that has no rigid channel allocation limitation for individual users.
The number of users is also not fixed as in TDMA and FDMA, and a new
user can be added to the system at any time. The upper limit for the maximum
number of simultaneous users in the system using the same frequency
spectrum is decided by the effect of total power of multi-user interference;
thus, adding new users to a CDMA system will only cause graceful
degradation of signal quality. CDMA is thus seen as an multiple access
scheme that has no fixed maximum number of users as opposed to TDMA
and FDMA schemes.
frequency
time
code
code 1
code 2
code 3
code 4

Figure 3-3 Code Division Multiple Access
LTE/EPS Technology

54
With the exponential increase in the number of users for mobile cellular
communications and the development of 3G wireless cellular systems,
CDMA, with its proven capacity enhancement over TDMA and FDMA, has
been chosen as the main multiple access scheme for 3G mobile cellular
systems.
CDMA schemes have some impressive advantages TDMA and FDMA do not
have. One is tolerance to the effects of multipath propagation. In CDMA we
can apply a Rake diversity technique that can improve performance against
severe multipath fading channels. Another advantage in cellular mobile
systems based on CDMA is that we can achieve efficient frequency reuse.
Because users are distinguished by their own codes, every cell can use the
same frequency (i.e. frequency re-use of one); therefore, we can obtain higher
spectral efficiency. Additionally, soft handover among cells is achievable.
On the other hand, a considerable problem in CDMA is interference from
other users. A value of cross-correlation is usually non-zero in CDMA, and it
limits channel capacity. In cellular mobile systems with CDMA, we face also
the near-far problem. A signal transmitted by a user who is far from the base
station can easily be blocked by a signal from a nearby user. To solve the
near-far problem, we should therefore introduce a power control technique in
CDMA systems to maintain the quality of signals from far users. Thus, the
base station should frequently send power control information to every user.
SDMA SDMA SDMA SDMA
Another important multiple access scheme is Space Division Multiple Access
(SDMA) that can provide high channel capacity in mobile cellular systems. In
SDMA, as its name indicates, users are separated in a spatial way, which is
very different from the multiple access schemes discussed earlier. In this
scheme generally an adaptive array antenna technique is adopted. The
adaptive array antenna can make the beam pattern flexible as needed, and
therefore it is possible to make each suitable beam pattern correspond to one
user. One remarkable advantage is that every user can share the same channel
resource such as frequency and/or time slot. This property suggests that
SDMA can easily enhance channel capacity by collaborating with other
multiple access schemes such as FDMA, TDMA, and CDMA. One
disadvantage of SDMA is that the multiple access gain is considerably
influenced by the location of users. We face the difficulty of separating two
users who are placed near the base station. The other problem is the
complexity of hardware for tracking the signals. The mobile terminal
continuously and sometimes rapidly changes its location. In order to keep a
high C/I, there is a need for an accurate and rapid tracking algorithm. In
SDMA, in addition to inter-cell handover, we have to consider an internal
3 OFDMA & SC-FDMA
55
handover technique, which will occur when the beams from two users get
close and finally cross over each other.
OFDMA OFDMA OFDMA OFDMA
Orthogonal Frequency Division Multiple Access (OFDMA) is a multi-carrier
transmission technique that has been recently recognized as an excellent
method for high speed bi-directional wireless data communication. Its history
dates back to the 1960s, but it has recently become popular because
economical integrated circuits that can perform the high speed digital
operations necessary have become available. OFDMA effectively squeezes
multiple modulated carriers tightly together, reducing the required bandwidth
but keeping the modulated signals orthogonal so they do not interfere with
each other. Today, the technology is used in such systems as ADSL as well as
wireless systems such as IEEE 802.11a/g (Wi-Fi) and IEEE 802.16
(WiMAX). It is also used for wireless digital audio and video broadcasting.
OFDMA was also chosen by 3GPP for LTE/E-UTRAN system.
It is based on FDMA, which is a technology that uses multiple frequencies to
simultaneously transmit multiple signals in parallel. Each signal has its own
frequency range (subcarrier) which is then modulated by data. Each sub-
carrier is separated by a guard band to ensure that they do not overlap. These
sub-carriers are then demodulated at the receiver by using filters to separate
the bands.
time
frequency
f1 f2 f3 f4 f5 f6 f7

Figure 3-4 Orthogonal Frequency Division Multiple Access
OFDMA is similar to FDMA but much more spectrally efficient by spacing
the sub-channels much closer together (until they are actually overlapping).
This is done by finding frequencies that are orthogonal, which means that they
are perpendicular in a mathematical sense, allowing the spectrum of each sub-
channel to overlap another without interfering with it. In Fig. 3-5, the effect of
this is seen as the required bandwidth is greatly reduced by removing guard
bands and allowing signals to overlap. In order to demodulate the signal, a
LTE/EPS Technology

56
Discrete Fourier Transform (DFT) is needed. Fast Fourier transform (FFT)
chips are commercially available, making this a relatively easy operation.
f
FDM
f
OFDM

Figure 3-5 FDM & OFDM channels spacing
In its most basic form, each data sub-carrier could be on or off to indicate a
one or zero bit of information. However, either PSK or QAM or even a higher
order modulation is typically employed to increase the data throughput.
OFDMA allows some sub-carriers to be assigned to different users. These
groups of sub-carriers are known as sub-channels.
Fouriertransform Fouriertransform Fouriertransform Fouriertransform
The Fourier transform decomposes or separates a waveform or function into
sinusoids of different frequency which sum to the original waveform. It
identifies or distinguishes the different frequency sinusoids and their
respective amplitudes. The Fourier transform is used in many fields of science
as a mathematical or physical tool to alter a problem into one that can be more
easily solved.
The Fourier transform of ( ) x f is defined as
( ) ( ) dx e x f s F
xs j 2

= .
Applying the same transform to ( ) s F gives
( ) ( )

= dx e s F w f
xs j 2
.
3 OFDMA & SC-FDMA
57
If ( ) x f is an even function of x , that is ( ) ( ) x f x f = , than ( ) ( ) x f w f = . If
( ) x f is an odd function of x , that is ( ) ( ) x f x f = , than ( ) ( ) x f w f = .
When ( ) x f is neither even nor odd, it can often be split into even or odd
parts.
To avoid confusion, it is customary to write the Fourier transform and its
inverse so that they exhibit reversibility:
( ) ( ) dx e x f s F
xs j 2

=
( ) ( )


= ds e s F x f
xs j 2

so that
( ) ( ) ds e dx e x f x f
xs j xs j 2 2

=
as long as the integral exists and any discontinuities, usually represented by
multiple integrals of the form ( ) ( ) [ ]
+
+ x f x f
2
1
, are finite. The transform
quantity ( ) s F is often represented as ( ) s f
~
and a Fourier transform is often
represented by the operator F FF F.
Since the Fourier transform ( ) s F is a frequency domain representation of a
function ( ) x f the s characterizes the frequency of the decomposed
cosinusoids and sinusoids and is equal to the number of cycles per unit of x. If
a function or waveform is not periodic then the Fourier transform of the
function will be a continuous function of frequency.
x
f(x)
s
|f(s)|
F FF F

Figure 3-6 Fourier transform
Timeandfrequencydomain Timeandfrequencydomain Timeandfrequencydomain Timeandfrequencydomain
It is often useful to think of functions and their transforms as occupying two
domains. These domains are officially referred to as the function and
transform domains, but in most physics applications they are simply called the
time and frequency domains respectively. Operations performed in one
LTE/EPS Technology

58
domain have corresponding operations in the other. For example, the
convolution operation in the time domain becomes a multiplication operation
in the frequency domain, that is ( ) ( ) ( ) ( ) s G s F x g x f . The reverse is also
true, ( ) ( ) ( ) ( ) x g x f s G s F . Such theorems allow one to move between
domains so that operations can be performed where they are easiest or most
advantageous.
t
f(t)
f
|F(f)|
F FF F

Figure 3-7 Time and frequency domain
Examples Examples Examples Examples
This section presents examples of some practical functions and their Fourier
transforms.
Fouriertransformofacosine Fouriertransformofacosine Fouriertransformofacosine Fouriertransformofacosine
In the time domain the function is given as
( ) ( ) ft t f 2 cos = ,
where f is frequency. The Fourier transform of this function is (i.e. its
frequency domain representation) is given as
( ) ( ) ( ) [ ] f s f s s F + + =
2
1

t
f(t)
s
F(s)
F FF F

Figure 3-8 Fourier transform of a cosine
3 OFDMA & SC-FDMA
59
Fouriertransformofasinusoid Fouriertransformofasinusoid Fouriertransformofasinusoid Fouriertransformofasinusoid
In the time domain the function is given as
( ) ( ) ft t f 2 sin = ,
where f is frequency. The Fourier transform of this function is (i.e. its
frequency domain representation) is given as
( ) ( ) ( ) [ ] f s f s i s F + =
2
1

Fouriertransformofa Fouriertransformofa Fouriertransformofa Fouriertransformofaunit unit unit unit
In the time domain the function is given as
( ) 1 = t f .
The Fourier transform of this function is (i.e. its frequency domain
representation) is given as
( ) ( ) s s F = .
t
f(t)
s
F(s)
F FF F

Figure 3-9 Fourier transform of a unit
Fouriertransformofa Fouriertransformofa Fouriertransformofa FouriertransformofaDirac Dirac Dirac Diracdeltafunction deltafunction deltafunction deltafunction
In the time domain the function is given as
( ) ( )

=
= =
0 , 0
0 ,
t
t
t t f .
The Fourier transform of this function is (i.e. its frequency domain
representation) is given as
( ) 1 = s F .
LTE/EPS Technology

60
t
f(t)
s
F(s)
F FF F

Figure 3-10 Fourier transform of a Dirac delta function
Fouriertransformofa Fouriertransformofa Fouriertransformofa Fouriertransformofarectangularpulse rectangularpulse rectangularpulse rectangularpulse
In the time domain the function is given as
( ) ( )

<
=
>
= =
5 , 0 1
5 , 0 5 , 0
5 , 0 0
t if
t if
t if
t rect t f .
The Fourier transform of this function is (i.e. its frequency domain
representation) is given as
( )
( )
s
s
s F
sin
= .
t
f(t)
s
F(s)
F FF F

Figure 3-11 Fourier transform of a rectangular pulse
FouriertransformofaGaussianfunction FouriertransformofaGaussianfunction FouriertransformofaGaussianfunction FouriertransformofaGaussianfunction
In the time domain the function is given as
( )
2
t
e t f

= .
The Fourier transform of this function is (i.e. its frequency domain
representation) is given as
( )
2
t
e s F

= .
3 OFDMA & SC-FDMA
61
t
f(t)
s
F(s)
F FF F

Figure 3-12 Fourier transform of a Gaussian function
Some Some Some Somebasic basic basic basicFouriertransformproperties Fouriertransformproperties Fouriertransformproperties Fouriertransformproperties
Linearity Linearity Linearity Linearity
Adding two functions together adds their Fourier transforms together:
F FF F(f+g)=F FF F(f)+F FF F(g).
This property is illustrated in Fig. 3-13, where we have a Fourier transform of
two cosine functions and a Fourier transform of their superposition.
t
f(t) F FF F(f)
t
g(t) F FF F(g)
t
f(t)+g(t)
F FF F(f+g)
F FF F
F FF F
F FF F

Figure 3-13 Fourier transform linearity (part 1)
Multiplying a function by a scalar constant multiplies its Fourier transform by
the same constant:
F FF F(af)=aF FF F(f).
LTE/EPS Technology

62
This property is illustrated in Fig. 3-14, where we have a Fourier transform of
two cosine functions of different amplitude.
t
f(t) F FF F(f)
F FF F
t
af(t) aF FF F(f)
F FF F

Figure 3-14 Fourier transform linearity (part 2)
Translation Translation Translation Translation
Translating a function leaves the magnitude unchanged and adds a constant to
the phase.
If
f2 = f1(t a)
F FF F1 = F FF F(f1)
F FF F2 = F FF F(f2)
then
|F FF F2| = |F FF F1|
(F FF F2) = (F FF F1) 2 sa
ChangeofScale ChangeofScale ChangeofScale ChangeofScale
If
f2 = f1(at)
F FF F1 = F FF F(f1)
F FF F2 = F FF F(f2)
than
F FF F2
a
1
= F FF F1 |

\
|
a
s

This property is illustrated in Fig. 3-15, where we have a Fourier transform of
two rectangular pulses of different length.
3 OFDMA & SC-FDMA
63
t
f(t) F FF F(f)
F FF F
t
f(at) F FF F(af)
F FF F

Figure 3-15 Change of scale
Rayleighs Rayleighs Rayleighs Rayleighst tt theorem heorem heorem heorem
Total energy of the signal, calculated as the sum of squares of the function
and its transform is the same.


|f(t)| dt =


|F FF F (s)| ds
Amplitudeandphasespectrum Amplitudeandphasespectrum Amplitudeandphasespectrum Amplitudeandphasespectrum
The Fourier transform of the signal can be used to find the spectrum of the
signal, that is to calculate the image or distribution of components of any
electromagnetic radiation arranged in the progressive series according to
wavelength or frequency.
The most important parameters of the signal are amplitude and phase, hence
the Fourier transform is very often presented as amplitude spectrum and phase
spectrum of the signal.
Fig. 3-16 illustrates the amplitude and phase spectrum of the rectangular
pulse.
t
f(t)
0

F FF F
|F F F F | (F FF F )

Figure 3-16 Amplitude and phase spectrum of the rectangular pulse
LTE/EPS Technology

64
DiscreteFourierTransform DiscreteFourierTransform DiscreteFourierTransform DiscreteFourierTransform
Because a digital computer works only with discrete data, numerical
computation of the Fourier transform of f(t) requires discrete sample values of
f(t) which are called later in this section fk. In addition, a computer can
compute the transform F(s) only at discrete values of s that is, it can only
provide discrete samples of the transform, Fr. If f(kT) and F(rs0) are the k-th
and r-th samples of f(t) and F(s), respectively, and N0 is the number of
samples in the signal in one period T0, then
( ) ( ) kT f
N
T
kT Tf f
k
0
0
= =
and
( )
0
rs F F
r
=
where
0
0
2
T
s

= .
The Discrete Fourier Transform (DFT) is defined as

=

=
1
0
0
0
N
k
k ir
k r
e f F
where
0
0
2
N

= . Its inverse is

=
1
0 0
0
0
1
N
r
k ir
r k
e F
N
f .
These equations can be used to compute transforms and inverse transforms of
appropriately sampled data.
3 OFDMA & SC-FDMA
65
0 0.2 0.4 0.6 0.8 1
-2
-1
0
1
2
sygnal x(n)
0 2 4 6 8 10 12 14
0
0.5
1
czestotliwosc w Hz
unormowane widmo amplitudowe sygnalu x(n)
signal x(n)
normalised amplitude spectrum
t[s]
f[Hz]

Figure 3-17 Discrete Fourier Transform (DFT)
Please note, that the spectrum samples are valid till the half of the sampling
frequency, i.e. in Fig. 3-17 the valid spectrum is from 0 to 7 Hz.
FastFourierTransform FastFourierTransform FastFourierTransform FastFourierTransform
The Fast Fourier Transform (FFT) is a DFT algorithm developed by John
Tukey and James Cooley in 1965 which reduces the number of computations
on the order of
2
0
N to
0 0
log N N . The algorithm is simplified if
0
N is chosen
to be a power 2, but it is not a requirement.
Orthogonalityoffrequencies Orthogonalityoffrequencies Orthogonalityoffrequencies Orthogonalityoffrequencies
The carriers in telecommunications are all sine / cosine wave. The area under
one period of sine or cosine wave is zero.
LTE/EPS Technology

66
+
+ +
- -
T T
0 0

Figure 3-18 Area under sine / cosine wave over one period
Lets take a sine wave of frequency m and multiply it by a sinusoid (sine or
cosine) of a frequency n, where both m and n are integers. The integral or the
area under this product is given by
( ) t n t m t f sin sin = .
m=1 , n=4
T T
0 0

Figure 3-19 Sine wave multiplied by its own harmonic
Since, by the simple trigonometric relationship, the product of two sinusoids
of frequencies n and m is equal to a sum of two sinusoids of frequencies (n-m)
and (n+m), the integral of this product is
( ) ( ) 0 cos
2
1
cos
2
1
sin sin
2
0
2
0
= + =

dt t n m dt t n m t n t m


These two components are each a sinusoid, so the integral is equal to zero
over one period.
When a sinusoid of frequency n is multiplied by a sinusoid of frequency m/n,
the area under the product is zero. In general for all integers n and m, sinmx,
cosmx, sinnx, cosnx are all orthogonal to each other. These frequencies are
called harmonics.
3 OFDMA & SC-FDMA
67
ChannelseparationinFDMA ChannelseparationinFDMA ChannelseparationinFDMA ChannelseparationinFDMA
Having a bandwidth that goes from frequency a to b, it is possible to
subdivide this into a several equal frequency channels.
f
system bandwidth
ch #1 ch #2 ch #3 ch #4 ch #5 ch #6 ch #n
a b

Figure 3-20 Channel separation in FDMA
The frequencies a and b can be anything, integer or non-integer since no
relationship is implied between a and b. Same is true of carrier frequencies
which are based on frequencies that do not have any special relationship to
each other.
Before the digital signal can be sent over the air interface first it has to be
filtered and than modulated. Filtering is aimed at shaping the signal
bandwidth and modulation is responsible for moving the data onto the
carrier frequency in order to send it, i.e. modulation moves the spectrum of
the signals into higher frequency
cos(t)
RF
Filtering
Modulation
pulse
shaping
data
signal
P
o
w
e
r

S
p
e
c
t
r
u
m
M
a
g
n
i
t
u
d
e

(
d
B
)
0 0.1 0.2 0.3 0.4 0.5 0.6
-50
-40
-30
-20
-10
0
10
Frequency
0 0.1 0.2 0.3 0.4 0.5 0.6
-60
-50
-40
-30
-20
-10
0
10
Frequency
0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8
x 10
7
-40
-20
0
20
40
60
80
Frequency

Figure 3-21 Filtering and modulation processes
LTE/EPS Technology

68
Filtering Filtering Filtering Filtering
Transmission of modulated signals over the air interface requires a frequency
channel of a proper width. The wider the channel, the more data can be sent.
The relation between the channel width and maximum data rate possible to be
sent over that channel depends among others on the used modulation scheme.
Theoretically the spectrum of a rectangular-shaped signal is infinite.
f

Figure 3-22 Spectrum of rectangular-shaped signal
In order to be able to allocate different frequency channels to different
transmissions and for different applications, the spectrum of a signal must be
filtered and thus limited.
G
0
1
LPF
f f

Figure 3-23 Filtering of rectangular pulse (time domain)
Filtering however affects the signal appearance in time-domain: the more
limited spectrum the more disturbed signal and the more difficult detection.
The rectangular signal after channel filtering becomes more spread and
delayed in time (so called signal ringing appears) and can possibly interfere
with subsequent signals, causing in effect higher Bit Error Rate (BER).
Therefore a trade-off must be achieved: on one hand the need is to avoid
Adjacent Channel Interference (ACI), and on the other hand the requirement
is to limit Inter Symbol Interference (ISI). This is a compromise between
spectral efficiency and BER.
LPF
ringing
t t

Figure 3-24 Filtering of rectangular pulse (frequency domain)
3 OFDMA & SC-FDMA
69
For the above reasons filtering is commonly known also as pulse shaping.
One of the most popular types of filters used in telecommunications for pulse-
shaping is a Root Raised Cosine (RRC) filter. The typical values of roll-off
factor (parameter ) are around 0.25. In general, the roll-off factor can vary
between 0 and 1, resulting in different bandwidth of the filtered signal. The
lower the the more limited the spectrum.
0 50 100 150 200 250 300
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
= 0.1
= 0.3
= 0.5
= 0.7
= 0.9
frequency
gain

Figure 3-25 Root Raised Cosine filter
The impulse response of the RRC filter is also dependent on the parameter,
as depicted in Fig. 3-26, the lower the roll-off factor the more ringing can be
observed.
RRC filter has an interesting property that makes its application efficient. It
may be noticed that independently on the roll-off factor, ringing is zero at
certain time instants. If sampling of the signal is done at those time instants,
theoretically there is no ISI. Practically ISI appears due to timing jitter, which
is bigger for lower values.
-0.4
-0.2
0
0.2
0.4
0.6
0.8
1
= 0.01 = 0.3
t1 t2 t3 t4 t5 t6 t7 t8 t9 t1 t2 t3 t4 t5 t6 t7 t8 t9

Figure 3-26 Root Raised Cosine filter impulse response
LTE/EPS Technology

70
Modulation Modulation Modulation Modulation
There are three major classes of digital modulation techniques used for
transmission of digitally represented data:
Amplitude Shift keying (ASK),
Frequency Shift keying (FSK),
Phase Shift keying (PSK).
All convey data by changing some aspect of a base signal, the carrier wave,
(usually a sinusoid) in response to a data signal. In the case of PSK, the phase
is changed to represent the data signal. There are two fundamental ways of
utilising the phase of a signal in this way:
by viewing the phase itself as conveying the information, in which
case the demodulator must have a reference signal to compare the
received signal's phase against; or
by viewing the change in the phase as conveying information -
differential schemes, some of which do not need a reference carrier (to
a certain extent).
A convenient way to represent PSK schemes is on a constellation diagram.
This shows the points in the Argand plane where, in this context, the real and
imaginary axes are termed the in-phase and quadrature axes respectively due
to their 90 separation. Such a representation on perpendicular axes lends
itself to straightforward implementation. The amplitude of each point along
the in-phase axis is used to modulate a cosine (or sine) wave and the
amplitude along the quadrature axis to modulate a sine (or cosine) wave.
In PSK, the constellation points chosen are usually positioned with uniform
angular spacing around a circle. This gives maximum phase-separation
between adjacent points and thus the best immunity to corruption. They are
positioned on a circle so that they can all be transmitted with the same energy.
In this way, the moduli of the complex numbers they represent will be the
same and thus so will the amplitudes needed for the cosine and sine waves.
Two common examples are Binary Phase Shift Keying (BPSK) which uses
two phases, and Quadrature Phase Shift Keying (QPSK) which uses four
phases, although any number of phases may be used. Since the data to be
conveyed are usually binary, the PSK scheme is usually designed with the
number of constellation points being a power of 2.
3 OFDMA & SC-FDMA
71
BPSK BPSK BPSK BPSK
BPSK is the simplest form of PSK. It uses two phases which are separated by
180 and so can also be termed 2-PSK. It does not particularly matter exactly
where the constellation points are positioned, and in this figure they are
shown on the real axis, at 0 and 180. This modulation is the most robust of
all the PSKs since it takes serious distortion to make the demodulator reach an
incorrect decision. It is, however, only able to modulate at 1 bit/symbol (as
seen in the figure) and so is unsuitable for high data-rate applications when
bandwidth is limited.
QPSK QPSK QPSK QPSK
Sometimes known as quaternary or quadriphase PSK or 4-PSK, QPSK uses
four points on the constellation diagram, equispaced around a circle. With
four phases, QPSK can encode two bits per symbol, shown in the diagram
with Gray coding to minimize the BER - twice the rate of BPSK. Analysis
shows that this may be used either to double the data rate compared to a
BPSK system while maintaining the bandwidth of the signal or to maintain
the data rate of BPSK but halve the bandwidth needed.
Although QPSK can be viewed as a quaternary modulation, it is easier to see
it as two independently modulated quadrature carriers. With this
interpretation, the even (or odd) bits are used to modulate the in-phase
component of the carrier, while the odd (or even) bits are used to modulate the
quadrature-phase component of the carrier. BPSK is used on both carriers and
they can be independently demodulated.
PSKtransmitter PSKtransmitter PSKtransmitter PSKtransmitter
QPSK systems can be implemented in a number of ways. An illustration of
the major components of the transmitter and receiver structure are shown in
Fig. 3-27.
The binary data stream is split into the in-phase and quadrature-phase
components. These are then separately modulated onto two orthogonal basis
functions. In this implementation, two sinusoids are used. Afterwards, the two
signals are superimposed, and the resulting signal is the QPSK signal. Note
the use of polar non-return-to-zero encoding. These encoders can be placed
before for binary data source, but have been placed after to illustrate the
conceptual difference between digital and analogue signals involved with
digital modulation.
LTE/EPS Technology

72
11000110
1 0 0 1
1 0 1 0
D
E
M
U
X
NRZ
coder
NRZ
coder
digital signals
binary
bitstream
analogue signals
+1
-1
sin(t)
cos(t)
phase shift
oscillator
QPSK
signal
I
Q

Figure 3-27 QPSK transmitter
The modulated signal is shown below for a short segment of a binary data
stream. The two carrier waves are a cosine wave and a sine wave, as indicated
by the signal-space analysis above. Here, the odd-numbered bits have been
assigned to the in-phase component and the even-numbered bits to the
quadrature component. The total signal - the sum of the two components - is
shown at the bottom. Jumps in phase can be seen as the PSK changes the
phase on each component at the start of each bit-period. The topmost
waveform alone matches the description given for BPSK above.
1
1 0
0 0
0 1
1
11 00 01 10
I
Q
QPSK
Ts 0 2Ts 3Ts 4Ts

Figure 3-28 QPSK signal in time domain
3 OFDMA & SC-FDMA
73
BPSK transmitter can be implemented in a very similar way, with that
difference, that only in-phase component is used.
1 0 0 1
NRZ
coder
digital signal
binary
bitstream
analogue signal
+1
-1
cos(t)
oscillator
BPSK
signal

Figure 3-29 BPSK transmitter
1 0 0 1
BPSK
Ts 0 2Ts 3Ts 4Ts

Figure 3-30 BPSK signal in time domain
Bandwidth Bandwidth Bandwidth Bandwidthefficiency efficiency efficiency efficiency
The symbol rate that can be carried by a PSK carrier of a certain bandwidth, is
given by:
p l s
B B R = = 2
Where
l
B is a lowpass bandwidth and
p
B the passband bandwidth.
This relation assumes a perfect filtering with roll-off equal to zero. Since this
is unachievable, we use root raised cosine filtering which for a roll-off of
gives the following relationship.
+
=
1
p
s
B
R
So if we need three carriers, each of data rate 20 Mbps and we assume usage
of BPSK, the
s
R would be equal to 20 Msps. For the =0,25 this results in the
required bandwidth ( ) MHz Msps R B
s p
25 ) 25 , 0 1 ( 20 1 = + = + = . If
additionally we assume guard band =10%, each carrier may be placed 27,5
MHz apart. The frequencies would not be orthogonal but in FDMA we do not
care about this. It is the guard band that helps keep interference under control.
LTE/EPS Technology

74
Rs
(1+)Rs
(1+)(1+)Rs
f
chn-1 chn chn+1

Figure 3-31 FDMA bandwidth efficiency
All together to support 320 Mbps = 60 Mbps, with BPSK modulation, we
need 327,5 MHz = 82,5 MHz, which gives bandwidth efficiency of 60 Mbps
/ 82,5 MHz = 0,73 bpHz.
Without assumptions about the symbol rate and the type of the modulation we
can write that the bandwidth efficiency is:
( )( ) + +
=
1 1
1
b
E [spHz]
For the typical values of =0,25 =0,1
b
E is 0,73 spHz.
ChannelseparationinOFDMA ChannelseparationinOFDMA ChannelseparationinOFDMA ChannelseparationinOFDMA
In OFDMA, the sub-carrier frequencies are chosen so that the sub-carriers are
orthogonal to each other, meaning that cross-talk between the sub-channels is
eliminated and inter-carrier guard bands are not required. This greatly
simplifies the design of both the transmitter and the receiver; unlike
conventional FDMA, a separate filter for each sub-channel is not required.
The transmission of rectangular pulses is central to the ability to space
subcarriers very closely in frequency domain without creating Inter Carrier
Interference (ICI). We may recall that a uniform rectangular pulse in the time
domain results in a function sin(x)/x in the frequency domain as shown in
Fig. 3-32. The LTEs OFDMA symbol period is 66.6 s (1/15 kHz), which
results in sin(x)/x pattern in the frequency domain with uniformly spaced
zero-crossings at 15 kHz intervals.
3 OFDMA & SC-FDMA
75
t
F FF F
f
66.6 s
(1/15 kHz)
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz

Figure 3-32 OFDMA - spectrum of the rectangular pulse
Modulation moves the spectrum of the signals into a proper frequency, very
close to the next modulated subcarrier, so that centres of the subcarriers are
located at the zero crossings of other subcarriers spectrum, i.e. subcarrier
separation is 15 kHz. Having a combined signal of N sub-carriers in the
baseband frequency it is than possible to shift the entire spectrum of N sub-
carriers into a suitable RF band.
f
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz

Figure 3-33 OFDMA signal spectrum
On the receiver side, it is therefore possible, to detect the phase of the signal
at the centre frequency of each subcarrier while encountering no interference
from neighbouring subcarriers.
Bandwidth Bandwidth Bandwidth Bandwidthefficie efficie efficie efficiency ncy ncy ncy
QPSK signal produces a spectrum such that its bandwidth is equal to
(1+)
s
R . In OFDM, the adjacent carriers can overlap in the manner shown
below. The addition of two sub-carriers carriers (red colour) to the existing
sub-carrier (black colour) now allows transmitting 3
s
R over the bandwidth of
-2
s
R to +2
s
R or total of 4
s
R . This gives a bandwidth efficiency of 0,75 spHz,
which is comparable to the efficiency of the FDMA system. However when
LTE/EPS Technology

76
more and more carriers are added, the efficiency is growing, reaching for a
large number of subcarriers efficiency closed to 1 spHz.
Without making any assumptions about the number of sub-carriers N, the
effective bandwidth
b
E is:
1 +

=
N
R N
E
s
b
.
f
Rs
1 2 3 N

Figure 3-34 OFDMA bandwidth efficiency
Transmission Transmission Transmission Transmissione ee example xample xample xample
In OFDMA we have N carriers, where N can be anything from 16 to 1024 in
present technology and depends on the environment in which the system will
be used.
Lets examine the bit sequence (see Fig. 3-35) we wish to transmit and show
the development of the OFDM signal using 4 sub-carriers. Lets now write
these bits in four rows, since this demonstration will use only four sub-
carriers. We have effectively done a serial to parallel conversion.
...1,1,0,1,0,1
...,1,1,1,0,0,1,1,1,0,0,1,1,1,0,1,0,0,0,0,1,1,0,0,1
...0,1,1,0,1,1
...1,1,1,1,0,0
...1,0,0,0,0,0
c1
c2
c3
c4

Fig. 3-35 Serial to parallel conversion
Each row represents the bits that will be carried by one sub-carrier. Lets start
with the first carrier ,
1
c .
3 OFDMA & SC-FDMA
77
We have chosen BPSK as our modulation scheme for this example. (For
QPSK it is just necessary to imagine the same thing going on in the Q
channel, and then double the bit rate while keeping the symbol rate the same).
Note that it is possible to use any other modulation method, QPSK, 8PSK, 32-
QAM or even higher.
On
1
c we need to transmit 0,1,1,0,1,1, which is shown below superimposed on
the BPSK carrier frequency
1
c .
11 01 10

Figure 3-36 Modulated sub-carrier 1
The next carrier is
2
c , which is the next orthogonal/harmonic to
1
c , takes the
bits in the second row, i.e. 1,1,1,1,0,0.
00 11 11

Figure 3-37 Modulated sub-carrier 2
The next two carriers
3
c ,
4
c are modulated with 1,0,0,0,0,0 and 1,1,0,1,0,1
respectively.
00 10 00

Figure 3-38 Modulated sub-carrier 3
LTE/EPS Technology

78
01 11 01

Figure 3-39 Modulated sub-carrier 4
What we have done is taken the bit stream, distributed the bits, one bit at a
time to each sub-carrier as shown below. Now its it time to add all of these
modulated carriers to create the OFDM signal. Note how much it varies
compared to the underlying constant amplitude sub-carriers.
11100111 00011001 00111010

Figure 3-40 OFDM signal
Implementation Implementation Implementation Implementation
Transmitter Transmitter Transmitter Transmitter
The basic block diagram of the OFDM transmitter is shown in Fig. 3-41.
FFT
-1
FFT
-1
D/A
Re
Im
D/A
90
0
90
0
constellation
mapping
s[n]
s(t)
f
X0
X1
XN-2
XN-1
CP

Figure 3-41 OFDM transmitter
3 OFDMA & SC-FDMA
79
Serialtoparallelconversion Serialtoparallelconversion Serialtoparallelconversion Serialtoparallelconversion
The incoming data are first serial to parallel converted in order to create N
data streams for N sub-carriers.
Constellationmapping Constellationmapping Constellationmapping Constellationmapping
The constellation mapper, that works independently for each sub-carrier,
converts input data into complexed valued constellation points, according to a
given constellation. BPSK, QPSK, 16 QAM and 64QAM are the typical
constellations for wireless applications.
BPSK QPSK 16QAM 64QAM

Figure 3-42 Typical constellations for wireless applications
The amount of data transmitted on each subcarrier depends on the
constellation, e.g. BPSK and 16QAM transmit one and four data bits per sub-
carrier, respectively. Which constellation to choose depends on the channel
quality. In a high interference channel a small constellation like BPSK is
favourable, since the required Signal-to-Noise Ratio (SNR) in the receiver is
low, whereas in a low interference channel a larger constellation is more
beneficial due to the higher bit rate.
Please note that, the complex value going out from a constellation mapper is
in fact a value of the Fourier transform for the frequency of the sub-carrier. In
other words, the values going out from the constellation points are giving the
spectrum of the OFDM signal sampled at the frequencies of sub-carriers.
LTE/EPS Technology

80
QPSK
11 1+j
1
j
I {Re}
Q {Im}
(11)
2
/4
4
2 1

j
e j

= +
|F F F F | (F FF F )
cn
2
cn+1 cn-1
cn cn+1 cn-1
/4
-3/4

Figure 3-43 Constellation mapper output = spectrum sample
IFFT IFFT IFFT IFFT
An IFFT is computed on each set of symbols, giving a set of complex time-
domain samples.
As this step can be quite confusing below two extra diagrams presents the
straight forward method of OFDM signal generation and the method based
on IFFT modulation. As can be seen there is no difference in terms of output
signal from the transmitter, however the second method requires much less
processing power.

c1
c2
c3
cn
D/A

Figure 3-44 OFDM signal generation (approach 1)
3 OFDMA & SC-FDMA
81
FFT
-1
FFT
-1
D/A
Re
Im
D/A
90
0
s(t)
f

Figure 3-45 OFDM signal generation (approach 2)
CPinsertion CPinsertion CPinsertion CPinsertion
The Cyclic Prefix (CP) is a copy of the last n samples from the IFFT, which
are placed at the beginning of the OFDM symbol. The function of the CP is
described later in this chapter.
DAC DAC DAC DAC
The real and imaginary components of the digital samples coming from the
CP insertion block are first converted to the analogue domain using Digital-
to-Analogue Converters (DACs).
Modulation Modulation Modulation Modulation
The analogue signals are then used to modulate cosine and sine waves at the
carrier frequency,
c
f , respectively. These signals are then summed to give the
transmission signal, s(t).
LTE/EPS Technology

82
Receiver Receiver Receiver Receiver
The basic block diagram of the OFDM receiver is shown in Fig. 3-46.
FFT
A/D
Re
Im
A/D
90
0
symbol
detection
[n] r(t)
f
Y0
Y1
YN-2
YN-1
CP

Figure 3-46 OFDM receiver
The receiver picks up the signal r(t), which is then quadrature-mixed down to
baseband using cosine and sine waves at the carrier frequency. This also
creates signals centered on
c
f 2 , so low-pass filters are used to reject these.
The baseband signals are then sampled and digitised using Analogue-to-
Digital Converters (ADCs), and a forward FFT is used to convert back to the
frequency domain.
This returns N parallel streams, each of which is converted to a binary stream
using an appropriate symbol detector. These streams are then re-combined
into a serial stream, ( ) t s , which is an estimate of the original binary stream at
the transmitter.
A AA Advantages dvantages dvantages dvantagesanddisadvantages anddisadvantages anddisadvantages anddisadvantages
Multipathpropagation Multipathpropagation Multipathpropagation Multipathpropagation
When information is transmitted over a wireless channel, the signal can be
distorted due to multipath. Typically (but not always) there is a line-of-sight
path between the transmitter and receiver. In addition, there are many other
paths created by signal reflection off buildings, vehicles and other
obstructions as shown in Fig. 3-47.
3 OFDMA & SC-FDMA
83

Figure 3-47 Multipath propagation
Signals travelling along these paths all reach the receiver, but are shifted in
time by an amount corresponding to the differences in the distance travelled
along each path.
To date, cellular systems have used single carrier modulation schemes almost
exclusively. Although LTE uses OFDM rather than single carrier modulation,
its instructive to briefly discuss how single carrier systems deal with
multipath-induced channel distortion. This will form a point of reference from
which OFDM systems can be compared and contrasted.
The term delay spread describes the amount of time delay at the receiver from
a signal travelling from the transmitter along different paths. In cellular
applications, delay spreads can be several microseconds. The delay induced
by multipath can cause a symbol received along a delayed path to bleed into
a subsequent symbol arriving at the receiver via a more direct path. This
effect is depicted in Fig. 3-48 and is referred to as Inter Symbol Interference
(ISI). In a conventional single carrier system symbol times decrease as data
rates increase. At very high data rates (with correspondingly shorter symbol
periods), it is quite possible for ISI to exceed an entire symbol period and spill
into a second or third subsequent symbol.
symbol duration
ISI
delayed signal received via longer path
ISI ISI ISI
signal received via direct path

Figure 3-48 Inter Symbol Interference (ISI)
Its also helpful to consider the effects of multipath distortion in the frequency
domain. Each different path length and reflection will result in a specific
phase shift. As all of the signals are combined at the receiver, some
frequencies within the signal band undergo constructive interference (linear
LTE/EPS Technology

84
combination of signals in-phase), while others encounter destructive
interference (linear combination of signals out-of-phase). The composite
received signal is distorted by frequency selective fading (see Fig. 3-49).
signal bandwidth signal bandwidth
Tx Rx
f f
multipath
distortions

Figure 3-49 Frequency selective fading
Single carrier systems compensate for channel distortion via time domain
equalization by one of two methods:
Channel inversion: A known sequence is transmitted over the channel
prior to sending information. Because the original signal is known at
the receiver, a channel equalizer is able to determine the channel
response and multiply the subsequent data-bearing signal by the
inverse of the channel response to reverse the effects of multipath.
Rake equalizers (CDMA systems) to resolve the individual paths and
then combine digital copies of the received signal shifted in time to
enhance the receiver Signal-to-Noise Ratio (SNR).
In either case, channel equalizer implementation becomes increasingly
complex as data rates increase. Symbol times become shorter and receiver
sample clocks must become correspondingly faster. ISI becomes much more
severe - possibly spanning several symbol periods.

adaptive
algorithm

Figure 3-50 Traversal filter channel equalizer
The finite impulse response transversal filter is a common equalizer topology.
As the period of the receiver sample clock decreases, more samples are
required to compensate for a given amount of delay spread. The number of
3 OFDMA & SC-FDMA
85
delay taps increases along with the speed and complexity of the adaptive
algorithm. For LTE data rates (up to 100 Mbps) and delay spreads
(approaching 17 s), this approach to channel equalization becomes
impractical. As we will discuss below, OFDM eliminates ISI in the time
domain, which dramatically simplifies the task of channel compensation.
Unlike single carrier systems described above, OFDM communication
systems do not rely on increased symbol rates in order to achieve higher data
rates. This makes the task of managing ISI much simpler. OFDM systems
break the available bandwidth into many narrower sub-carriers and transmit
the data in parallel streams. Each subcarrier is modulated using varying levels
of QAM modulation, e.g. QPSK, QAM, 64QAM or possibly higher orders
depending on signal quality. Each OFDM symbol is therefore a linear
combination of the instantaneous signals on each of the sub carriers in the
channel. Because data is transmitted in parallel rather than serially, OFDM
symbols are generally much longer than symbols on single carrier systems of
equivalent data rate.
There are two truly remarkable aspects of OFDM. First, each OFDM symbol
is preceded by a Cyclic Prefix (CP), which is used to effectively eliminate ISI.
Second, the sub-carriers are very tightly spaced to make efficient use of
available bandwidth, yet there is virtually no interference among adjacent sub-
carriers (no ICI). These two unique features are actually closely related. In
order to understand how OFDM deals with multipath distortion, its useful to
consider the signal in both the time and frequency domains.
To understand how OFDM deals with ISI induced by multipath, consider the
time domain representation of an OFDM symbol shown in Fig. 3-51. The
OFDM symbol consists of two major components: the CP and an FFT period
(
FFT
T ). The duration of the CP is determined by the highest anticipated degree
of delay spread for the targeted application. When transmitted signals arrive at
the receiver by two paths of differing length, they are staggered in time as
shown in Fig. 3-51.
CP=4,6875s
TFFT=66,667s
delay < CP
baseband processor
strips off CP

Figure 3-51 ISI elimination (longer symbol period & cyclic prefix)
LTE/EPS Technology

86
Within the CP, it is possible to have distortion from the preceding symbol.
However, with a CP of sufficient duration, preceding symbols do not spill
over into the FFT period; there is only interference caused by time-staggered
copies of the current symbol. Once the channel impulse response is
determined (by periodic transmission of known reference signals), distortion
can be corrected by applying an amplitude and phase shift on a subcarrier-by-
subcarrier basis.
Note that all of the information of relevance to the receiver is contained
within the FFT period. Once the signal is received and digitized, the receiver
simply throws away the CP. The result is a rectangular pulse that, within each
subcarrier, is of constant amplitude over the FFT period.
An OFDMA signal offers also an advantage in channel that has a frequency
selective fading response. As we can see in Fig. 3-52, when OFDM signal is
laid against the frequency selective response of the channel, only some of the
sub-carriers are affected. Instead of the whole symbol being knocked out, just
a small subset of the (1/N) bits is lost. With proper coding, this can be
recovered.
f
channel quality

Figure 3-52 OFDM and frequency selective fading
The BER performance of an OFDM signal in a fading channel is much better
then the performance of QPSK/FDM which is a single carrier wideband
signal. Although the underlying BER of a OFDM signal is exactly the same as
the underlying modulation, that is if 8PSK is used to modulate the sub-
carriers, then the BER of the OFDM signal is same as the BER of 8PSK
signal in Gaussian channel. But in channels that are fading, the OFDM offers
far better BER than a wide band signal of exactly the same modulation. The
advantage here is coming from the diversity of the multi-carrier such that the
fading applies only to a small subset.
3 OFDMA & SC-FDMA
87
Cyclicprefix Cyclicprefix Cyclicprefix Cyclicprefix
Within the CP, it is possible to have distortion from the preceding symbol.
However, with a CP of sufficient duration, preceding symbols do not spill
over into the FFT period; there is only interference caused by time-staggered
copies of the current symbol.
CP CP CP CP CP CP

Figure 3-53 Cyclic prefix
Cyclic prefix can not be a blank space in the signal, as the signals in practice
must be continuous.
The first choice to fill the cyclic prefix space is to run the preceding symbol
longer, i.e. to extend the symbol into the empty space, so the actual symbol is
more than one cycle. In that case however, the start of the symbol that is vital
for the correct bit(s) detection is still in the dangerous zone, as the
discontinuity of the signal causes distortion in both time and frequency
domain.
CP CP CP CP CP CP

Figure 3-54 Cyclic prefix as an extension of the preceding symbol
The second and a correct choice is to fill the cyclic prefix space by the copy
of the current symbols tail. In that case the start of the symbol is outside the
delay spread zone and at the beginning of the symbol the signal is perfectly
continuous, which means that there are no distortions in the area where the
signals samples are taken.
LTE/EPS Technology

88
CP CP CP CP
CP CP

Figure 3-55 Cyclic prefix as a copy of the current symbols tail
This procedure is called adding a cyclic prefix. In theory since OFDM, has a
lot of carriers, it must be done to each and every carrier. In reality since
OFDM signal is a linear combination, it is possible to add cyclic prefix just
once to the composite OFDM signal.
copy copy

Figure 3-56 Addition of the cyclic prefix (part 1)
Prefix is added just once to the composite signal after doing IFFT. After the
signal has arrived at the receiver, first prefix is removed, to get back the
perfectly periodic signal so it can be FFTd to get back the symbols on each
carrier.
serial to
parallel
conversion
IFFT
remove
cyclic
prefix
add
cyclic
prefix
FFT
parallel to
serial
conversion

Figure 3-57 Addition of the cyclic prefix (part 2)
3 OFDMA & SC-FDMA
89
Outofbandsignal Outofbandsignal Outofbandsignal Outofbandsignal
Fig. 3-58 presents the spectrum of the OFDM signal. Note that the out of band
signal is down by 50 dB without any pulse shaping or filtering.
[dB]
-50
-100
-150
-200
0.0 0.1 0.2 0.3 0.4 0.5 -0.1 -0.2 -0.3 -0.4 -0.5

Figure 3-58 Spectrum of the OFDM signal (1024 sub-carriers)
Compare this to the spectrum of a QPSK signal, note how much lower the
sidebands are for OFDM and how much less in the variance.
[dB]
-20
-40
-60
-80
-100
0.0 0.1 0.2 0.3 0.4 0.5 -0.1 -0.2 -0.3 -0.4 -0.5

Figure 3-59 The spectrum of a QPSK signal
Frequencyerrors Frequencyerrors Frequencyerrors Frequencyerrors
OFDM systems can achieve zero-ICI if each subcarrier is sampled precisely at
its center frequency. The time-sampled OFDM signal is converted into the
frequency domain by means of an FFT.
Lets consider a specific LTE example. LTE defines transmission bandwidths
from 1.25 MHz up to 20 MHz. In the case of 1.25 MHz transmission
bandwidth, the FFT size is 128. In other words, 128 samples are taken within
LTE/EPS Technology

90
the FFT period of 66.67 s. Therefore, Ts = 0.52086 s, and the received
signal is represented by frequencies at 15 kHz, 30 kHz, 45 kHz These
frequencies are the exact centre frequencies of the signal subcarriers - unless
frequency errors are encountered in the downconversion process.
The FFT is done at baseband frequency, after the received signal has been
down converted from the RF carrier frequency. Downconversion is typically
performed by means of direct conversion. The received signal is mixed with a
signal produced by the receivers Local Oscillator (LO). Ideally, the carrier
signal and the receiver LO are at the identical frequency. Unfortunately, this
is not always the case.
The transmitter and receiver local oscillators will invariably drift, so active
means must be taken to keep them synchronized. Each base station
periodically sends synchronisation signals which are used by the UE for this
purpose, among other things (synchronization signals are also used for initial
acquisition and handover). Even so, other sources such as Doppler shifts and
oscillator phase noise can still result in frequency errors. Uncorrected
frequency errors will result in ICI as shown in Fig. 3-60. For these reasons,
the signal frequency must be tracked continuously. Any offsets must be
corrected in the baseband processor to avoid excessive ICI that might result in
dropped packets.
f
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
FFT points
zero ICI

Figure 3-60 Demodulated signal without frequency offset
f
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
15
kHz
ICI
frequency error

Figure 3-61 Demodulated signal with frequency offset
3 OFDMA & SC-FDMA
91
PA PA PA PAP PP PR RR R
The other major drawback to OFDM is a high Peak-to-Average Power Ratio
(PAPR). The instantaneous transmitted RF power can vary dramatically
within a single OFDM symbol. The OFDM symbol is a combination of all of
the subcarriers. Subcarrier voltages can add in-phase at some points within the
symbol, resulting in very high instantaneous peak power much higher than
the average power.
t

Figure 3-62 OFDM signal amplitude variations
A high PAPR drives dynamic range requirements for A/D and D/A
converters. Even more importantly, it also reduces efficiency of the
transmitter RF power amplifier. Single carrier systems sometimes use
constant envelope modulation methods, such as Gaussian Minimum Shift
Keying (GMSK) or Phase Shift Keying (PSK). The information in the signal
of a single carrier system is conveyed by varying the instantaneous frequency
or phase while the signal amplitude remains constant. The RF power amplifier
does not require a high degree of linearity. In fact, the power amplifier can be
driven so hard that the signal is clipped as the signal swings between the
minimum and maximum voltages. Harmonic distortion due to clipping can be
eliminated by output filtering. When RF power amplifiers are operated in this
manner, they can achieve efficiencies on the order of 70%.
In contrast, OFDM is not a constant envelope modulation scheme. Over the
duration of an OFDM symbol, there can be several large peaks. The RF power
amplifier must be capable of handling peak voltage swings without clipping,
thus requiring a larger amplifier to handle a given average power. Efficiency
is therefore lower. RF power amplifier efficiencies for OFDM signals can be
less than 20%. Although there are measures that can be taken to reduce
voltage peaks, PAPR for OFDM results in RF power amplifier efficiencies
that are generally lower than for single-carrier constant envelope systems.
LTE/EPS Technology

92
OFDMA OFDMA OFDMA OFDMA
Orthogonal Frequency Division Multiple Access (OFDMA) is a multiple
access scheme which is an extension of OFDM to accommodate multiple
simultaneous users.
The traffic multiplexing is performed by allocating each user a pattern of
frequency-time slots, depending on its data rate. Fig. 3-63 illustrates the
resource distribution between user channels, common control channels and
pilot symbols. Common control channels bring classically some information
about on the network, the cell, etc. Pilot symbols are useful to perform the
identification of the channel response. Thanks to these known symbols,
channel response can be interpolated both in time and frequency and simply
equalised.
frequency
time
pilot
control channel
user 1
user 2
user 3

Figure 3-63 OFDMA time-frequency allocation pattern
SC SC SC SC- -- -FDMA FDMA FDMA FDMA
Despite the benefits of OFDM and OFDMA, they suffer a number of
drawbacks including: high PAPR; a need for an adaptive or coded scheme to
overcome spectral nulls in the channel; and high sensitivity to frequency
offset.
Single Carrier Frequency Division Multiple Access (SC-FDMA), which
utilises single carrier modulation and frequency domain equalisation is a
technique that has similar performance and essentially the same overall
complexity as those OFDMA system. One prominent advantage over
3 OFDMA & SC-FDMA
93
OFDMA is that the SC-FDMA single has lower PAPR because of its inherent
single carrier structure. SC-FDMA has drawn great attention as an attractive
alternative to OFDMA, especially in the uplink communications where lower
PAPR greatly benefits the mobile terminal in terms of transmit power
efficiency.
FFT
-1
FFT
-1
D/A
Re
Im
D/A
90
0
s[n]
s(t)
f
X0
X1
XM-2
XM-1
CP
(N point)
x0
x1
xN-1
DFT
X0
X1
XN-1

(M point)
Sub-
carrier
mapping
(NM)

Figure 3-64 SC-FDMA transmitter
FFT
A/D
Re
Im
A/D
90
0
[n] r(t)
f
CP
Y0
Y1
YM-2
YM-1

Sub-
carrier
de-
mapping
Y0
Y1
YN-1
(MN)
DFT
-1
DFT
-1
(N point)
(M point)
y0
y1
yN-1

Figure 3-65 SC-FDMA receiver
A block diagram of a SC-FDMA transmitter is shown in Fig. 3-64.
SC-FDMA can be regarded as a DFT-spread OFDMA, where time domain
symbols are transformed to frequency domain by DFT before going through
OFDMA modulation. The orthogonality of the users stems from the fact that
each user occupies different subcarriers in the frequency domain, similar to
the case of OFDMA. Because the overall transmit signal is a single carrier
signal, PAPR is inherently low compared to the case of OFDMA which
produces a multicarrier signal.
{ }
k
X
DFT
(N point)
{ }
n
x
Subcarrier
mapping
{ }
l
X
~
IDFT
(M point)
{ }
m
x
~
N
T
N
T
M>N
M
N
T T =
~
N
T
~
N, M number of data symbols
T, symbol durations T
~

Figure 3-66 SC-FDMA signal generation
LTE/EPS Technology

94
Fig. 3-66 details the generation of SC-FDMA transmit symbols. There are M
subcarriers, among which N (N<M) subcarriers are occupied by the input
data. In the time domain, the input data symbol has symbol duration of T
seconds and the symbol duration is compressed to ( ) T
M
N
T =
~
after going
through SC-FDMA modulation.
There are two methods to choose the subcarriers for transmission as shown in
Fig. 3-67. In the distributed subcarrier mapping mode, DFT outputs of the
input data are allocated over the entire bandwidth with zeros occupying in
unused subcarriers, whereas consecutive subcarriers are occupied by the DFT
outputs of the input data in the localised subcarrier mapping mode.
1
~
M
X
0
x
1
x
2
x
1 N
x
0
~
X
1
~
M
X
zeros
zeros
zeros
0
x
1
x
1 N
x
zeros
0
~
X
Distributed mode Localised mode

Figure 3-67 Subcarrier mapping modes
Distributed and localised subcarrier mapping modes are also shown in
Fig. 3-68, where two subscribers are sharing the entire bandwidth of the
SC-FDMA system.
f
Distributed mode
f
Localised mode

Figure 3-68 Subcarrier mapping modes (spectral view)
4 E-UTRAN
95
Chapter Chapter Chapter Chapter4 44 4
E EE E- -- -UTRAN UTRAN UTRAN UTRAN
Topic Topic Topic Topic Page Page Page Page
Introduction...................................................................................................... 97
Duplex mode.................................................................................................... 97
Frequency bands ............................................................................................ 100
Inter-cell interference..................................................................................... 104
LTE physical layer ......................................................................................... 109
MIMO............................................................................................................ 115
E-MBMS........................................................................................................ 118
Channels......................................................................................................... 119
Data transfer................................................................................................... 127
LTE-Uu protocols .......................................................................................... 131
LTE/EPS Technology

96

This page is intentionally left blank
4 E-UTRAN
97
Introduction Introduction Introduction Introduction
The E-UTRAN consists of eNodeBs (eNBs), providing the E-UTRA user
plane and control plane protocol terminations towards the UE. The eNBs are
interconnected with each other by means of the X2 interface. The eNBs are
also connected by means of the S1 interface to the EPC, more specifically to
the MME by means of the S1-MME and to the S-GW by means of the S1-U.
The S1 interface supports a many-to-many relation between MMEs / Serving
Gateways and eNBs.
The E-UTRAN architecture is illustrated in Fig. 4-1 below.
MME/S-GW MME/S-GW
eNB eNB
eNB
S1
S1 S1
S1
X2
X2
X2
E-UTRAN

Figure 4-1 E-UTRAN architecture
Duplexmode Duplexmode Duplexmode Duplexmode
In full duplex systems there is a necessity to separate the transmission
between two users taking place in both directions at the same time.
The first method is to separate the transmission in both directions in
frequency domain by allocating a separate frequency channel for each
direction. The signals are not interfering with each other because there is a
certain duplex distance between these two frequencies. Such system is called
LTE/EPS Technology

98
Frequency Division Duplex (FDD) and is used by cellular systems of the
first, second and third generation like NMT, AMPS, GSM and D-AMPS, and
UMTS.
In case of the Time Division Duplex (TDD) transmissions in both directions
are implemented on the same frequency channel. This frequency channel is
divided into time slots. Each timeslot can be used either for reception or for
transmission. The switchover between transmission and reception is so
frequent that a quasi-simultaneous full-duplex communication is possible.
UMTS and DECT are examples of the systems using TDD.
time
frequency
time
frequency
FDD
TDD

Figure 4-2 FDD and TDD
In order to further increase E-UTRA bandwidth flexibility, the E-UTRAN
supports both FDD and TDD modes of operation. Moreover, most of the
design parameters are common to FDD and TDD modes to reduce the
complexity of the terminal.
TDDadvantages TDDadvantages TDDadvantages TDDadvantages
There are three main advantages of using the TDD mode compared to the
FDD:
No need for paired frequency band - the spectrum allocated for
IMT-2000 is asymmetric, which means that it cannot be used entirely
by only FDD mode, as it requires symmetric bands. Thus the solution
is to allocate the remaining asymmetric part to TDD systems. The
TDD mode also can be used in the regions where the available
frequency resources are limited.
Symmetric frequency channel - as UL and DL use the same
frequency channel, the dynamic channel characteristics remain similar
4 E-UTRAN
99
for transmission and reception. This means that based on received
signals the transmitter can predict the fast fading conditions of the
assigned frequency channel.
Asymmetric data transfer capability - in the TDD mode the
available resources may be dynamically allocated between UL and DL
according to current needs in a cell. This advantage meets the demand
of asymmetric services like Web browsing or database access.
TDDdisadvantages TDDdisadvantages TDDdisadvantages TDDdisadvantages
Deployment of the TDD mode brings also the problems of inter- and intra-cell
interference between UL and DL.
In FDD the uplink versus downlink interference problem practically does not
exists due to huge frequency separation. In TDD mode the basic problem is
that in adjacent cells the same chunk may be allocated for different directions.
If a UE tries to receive on a slot that is used by other terminal for
transmission, the interference level increases dramatically, especially if the
users are close to each other and/or transmission is with high power. A similar
scenario may apply for the eNB, which can block a UE reception in another
eNB. That is why, the TDD mode often requires synchronisation between
various transmitters and receivers in different cells in order to coordinate
allocation of chunks not only between cell but also between DL and UL
direction.
eNB #1
eNB #2
UE #1
UE #2
eNB #2 blocks
the reception
of UE #1 in
eNB #1
eNB #2 blocks
the reception
of UE #1 in
eNB #1
UE #1 blocks
the reception
of eNB #2
in UE #2
UE #1 blocks
the reception
of eNB #2
in UE #2
R R R R R R R R R T T T T T T R R R R R R R R R T T T T T T
T T T T T T T T T R R R R R R T T T T T T T T T R R R R R R
R R R R R R R R R R R T T T T R R R R R R R R R R R T T T T
T T T T T T T T T T T R R R R T T T T T T T T T T T R R R R
eNB #1
UE #1
eNB #2
UE #2

Figure 4-3 TDD intra-cell interference
LTE/EPS Technology

100
DuplexmodesinLTE DuplexmodesinLTE DuplexmodesinLTE DuplexmodesinLTE
LTE supports transmission in paired and unpaired spectrum, two duplex
modes are supported: FDD (supporting full duplex and half duplex operation),
and TDD.
UL
DL
Full duplex FDD:
UL
DL
Half duplex FDD:
UL/DL
TDD:
f1
f2
f1
f2
f1

Figure 4-4 FDD (full and half duplex) and TDD
Frequencybands Frequencybands Frequencybands Frequencybands
Part of the requirements for E-UTRAN is the ability to cope with various
spectrum allocations from much less than 5 MHz to much more than 5MHz,
accommodating future 3G spectrum allocations. Ultimately, the maximum
achievable data rate available should be 100 Mbps in 20 MHz. The OFDM
and SC-FDMA technologies should then allow a smooth migration from
1.4 MHz bandwidth to 20 MHz through 1.4, 3, 5, 10 and 15 MHz steps. In
E-UTRAN channel bandwidth very often is expressed in units called
Resource Block (RB). The RB is the smallest amount of radio resources that
can be allocated for a certain purpose. In frequency domain RB corresponds
to 180 kHz or 12 subcarriers.
100 75 50 25 15 6
Transmission bandwidth
configuration N
RB
20 15 10 5 3 1.4
Channel bandwidth
BW
Channel
[MHz]
100 75 50 25 15 6
Transmission bandwidth
configuration N
RB
20 15 10 5 3 1.4
Channel bandwidth
BW
Channel
[MHz]

Figure 4-5 Channel bandwidth
4 E-UTRAN
101
Please note that the channel bandwidth is greater than the total bandwidth
occupied by all the RBs inside ( kHz N
RB
180 ) i.e. transmission bandwidth
configuration, since some part of the channel bandwidth near to channel edge
is not used for RBs in order to minimise adjacent channel interference.

Transmission
Bandwidth [RB]
Transmission Bandwidth Configuration [RB]
Channel Bandwidth [MHz]
R
e
s
o
u
r
c
e

b
l
o
c
k
C
h
a
n
n
e
l

e
d
g
e
C
h
a
n
n
e
l

e
d
g
e
DC carrier (downlink only)
Active Resource Blocks

Figure 4-6 Channel bandwidth and transmission bandwidth configuration
E-UTRA is designed to operate in the majority frequency bands allocated for
PLMN use. The detailed definition of all the supported bands is presented in
Fig. 4-7. The channel raster is 100 kHz for all bands, which means that the
carrier centre frequency must be an integer multiple of 100 kHz.
TDD 2400 - 2300 2400 - 2300 40
TDD 1920 - 1880 1920 - 1880 39
TDD 2620 - 2570 2620 - 2570 38
TDD 1930 - 1910 1930 - 1910 37
TDD 1990 - 1930 1990 - 1930 36
TDD 1910 - 1850 1910 - 1850 35
TDD 2025 - 2010 2025 - 2010 34
TDD 1920 - 1900 1920 - 1900 33

FDD 768 - 758 798 - 788 14


FDD 756 - 746 787 - 777 13
FDD 746 - 728 716 - 698 12
FDD 1500.9 - 1475.9 1452.9 - 1427.9 11
FDD 2170 - 2110 1770 - 1710 10
FDD 1879.9 - 1844.9 1784.9 - 1749.9 9
FDD 960 - 925 915 - 880 8
FDD 2690 - 2620 2570 - 2500 7
FDD 885 - 875 840 - 830 6
FDD 894 - 869 849 - 824 5
FDD 2155 - 2110 1755 - 1710 4
FDD 1880 - 1805 1785 - 1710 3
FDD 1990 - 1930 1910 - 1850 2
FDD 2170 - 2110 1980 - 1920 1
Duplex
mode
DL [MHz] UL [Mhz]
E-UTRA
band
TDD 2400 - 2300 2400 - 2300 40
TDD 1920 - 1880 1920 - 1880 39
TDD 2620 - 2570 2620 - 2570 38
TDD 1930 - 1910 1930 - 1910 37
TDD 1990 - 1930 1990 - 1930 36
TDD 1910 - 1850 1910 - 1850 35
TDD 2025 - 2010 2025 - 2010 34
TDD 1920 - 1900 1920 - 1900 33

FDD 768 - 758 798 - 788 14


FDD 756 - 746 787 - 777 13
FDD 746 - 728 716 - 698 12
FDD 1500.9 - 1475.9 1452.9 - 1427.9 11
FDD 2170 - 2110 1770 - 1710 10
FDD 1879.9 - 1844.9 1784.9 - 1749.9 9
FDD 960 - 925 915 - 880 8
FDD 2690 - 2620 2570 - 2500 7
FDD 885 - 875 840 - 830 6
FDD 894 - 869 849 - 824 5
FDD 2155 - 2110 1755 - 1710 4
FDD 1880 - 1805 1785 - 1710 3
FDD 1990 - 1930 1910 - 1850 2
FDD 2170 - 2110 1980 - 1920 1
Duplex
mode
DL [MHz] UL [Mhz]
E-UTRA
band

Figure 4-7 E-UTRA frequency bands
LTE/EPS Technology

102
Channelnumber Channelnumber Channelnumber Channelnumber
The carrier frequency in the uplink and downlink is designated by the
E-UTRA Absolute Radio Frequency Channel Number (EARFCN). The
carrier frequency in MHz for the uplink and downlink is given by equations
shown in Fig. 4-8.,
( )
DL Offs DL low DL DL
N N F F

+ = 1 . 0
_
( )
UL Offs UL low UL UL
N N F F

+ = 1 . 0
_
DL
N
UL
N
where:
- downlink EARFCN
- uplink EARFCN
( )
DL Offs DL low DL DL
N N F F

+ = 1 . 0
_
( )
UL Offs UL low UL UL
N N F F

+ = 1 . 0
_
DL
N
UL
N
where:
- downlink EARFCN
- uplink EARFCN

Figure 4-8 DL/UL EARFCN
28650 29649 28650 2300 28650 29649 28650 2300 40
28250 28649 28250 1880 28250 28649 28250 1880 39
27750 28249 27750 2570 27750 28249 27750 2570 38

18280 18379 18300 788 5280 5379 5300 758 14


18180 18279 18180 777 5180 5279 5180 746 13
18000 18179 18000 698 5000 5179 5000 728 12
17750 17999 17750 1427.9 4750 4999 4750 1475.9 11
17150 17749 17150 1710 4150 4749 4150 2110 10
16800 17149 16800 1749.9 3800 4149 3800 1844.9 9
16450 16799 16450 880 3450 3799 3450 925 8
15750 16449 15750 2500 2750 3449 2750 2620 7
15650 15749 15650 830 2650 2749 2650 875 6
15400 15649 15400 824 2400 2649 2400 869 5
14950 15399 14950 1710 1950 2399 1950 2110 4
14200 14949 14200 1710 1200 1949 1200 1805 3
13600 14199 13600 1850 600 1199 600 1930 2
13000 13599 13000 1920 0 599 0 2110 1
Range of N
UL
N
Offs-UL
F
UL_low
[MHz] Range of N
DL
N
Offs-DL
F
DL_low
[MHz]
Uplink Downlink
Band
28650 29649 28650 2300 28650 29649 28650 2300 40
28250 28649 28250 1880 28250 28649 28250 1880 39
27750 28249 27750 2570 27750 28249 27750 2570 38

18280 18379 18300 788 5280 5379 5300 758 14


18180 18279 18180 777 5180 5279 5180 746 13
18000 18179 18000 698 5000 5179 5000 728 12
17750 17999 17750 1427.9 4750 4999 4750 1475.9 11
17150 17749 17150 1710 4150 4749 4150 2110 10
16800 17149 16800 1749.9 3800 4149 3800 1844.9 9
16450 16799 16450 880 3450 3799 3450 925 8
15750 16449 15750 2500 2750 3449 2750 2620 7
15650 15749 15650 830 2650 2749 2650 875 6
15400 15649 15400 824 2400 2649 2400 869 5
14950 15399 14950 1710 1950 2399 1950 2110 4
14200 14949 14200 1710 1200 1949 1200 1805 3
13600 14199 13600 1850 600 1199 600 1930 2
13000 13599 13000 1920 0 599 0 2110 1
Range of N
UL
N
Offs-UL
F
UL_low
[MHz] Range of N
DL
N
Offs-DL
F
DL_low
[MHz]
Uplink Downlink
Band

Figure 4-9 EARFCN DC carrier relation
4 E-UTRAN
103
Frequencyalloc Frequencyalloc Frequencyalloc Frequencyallocations ations ations ations
With the idea of creating a globally accepted 3G standard arose a need to
define a new spectrum for IMT-2000, which would be used in all over the
world. In 1992 The World Administrative Radio Conference held in Malaga-
Torremolinos (WARC-92) identified frequencies for the future third
generation systems. The following frequency bands have been allocated:
1885-1980 MHz, 2010-2025 MHz and 2110-2170 MHz for the
terrestrial components,
1980-2010 MHz and 2170-2200 for the satellite component.
Terrestrial MSS Terrestrial MSS
1885 1980 2010 2025 2110 2170 2200
WARC-92
WARC-2000
1710 1885 806 960 2500 2690
MHz
MHz
Terrestrial MSS Terrestrial MSS
1885 1980 2010 2025 2110 2170 2200
WARC-92
WARC-2000
1710 1885 806 960 2500 2690
MHz
MHz

Figure 4-10 Frequency allocations for IMT-2000
The WARC-92 allocations were made with the assumption that speech still
would be a major service in 3G networks and only low data rate services were
considered. With the continuously growing amount of traffic in 2G networks
and the converging trends in the telecommunications world a need for
additional frequencies arose. New frequencies were allocated at the
WARC-2000 conference in Istanbul. As it was difficult to reach a worldwide
consensus, no exact bands have been indicated for specific use, but an
agreement was signed that no 3G systems would be deployed outside
allocated additional bands, and that regional/national regulators would decide
the local use of the frequencies. Thus, the following frequency ranges has
been identified:
806-960 MHz
1710-1885 MHz
2500-2690 MHz
In the range below 1GHz, the frequencies currently used by 2G systems have
been also included to facilitate the migration of these systems to the third
generation.
LTE/EPS Technology

104
The actual allocations of the recommended frequencies for IMT-2000
(International Telecommunication Union) differ from country to country.
Most of the Europe and Asia follow the WARC-92 recommendations with
slight modifications. Fig. 4-11 shows the details on European allocations.
f [MHz]
1
8
8
0
MSS MSS
1
9
0
0
1
9
2
0
1
9
8
0
2
0
1
0
2
0
2
5
2
1
1
0
2
1
7
0
2
2
0
0
DECT
TDD TDD FDD FDD

Figure 4-11 IMT-2000 spectrum allocations in Europe
Since, there are no any new frequency allocations for EUTRAN, existing
operators have to divide their existing frequency allocation between UTRAN
and E-UTRAN. Typical operator in Europe has three FDD channels (2 x 3 x 5
MHz) and two TDD channels (2 x 5 MHz).
Several adjacent UTRA FDD or TDD channels can form a single channel for
a single EUTRA channel that can be FDD or TDD. Moreover in case of FDD
operation it is not required for the bandwidth to be equal in both directions.
Inter Inter Inter Inter- -- -cellinterference cellinterference cellinterference cellinterference
To make the best use of the whole available spectrum and limit the
complexity of frequency planning, it is planned usually to use the whole
spectrum in any cell, i.e. the re-use factor is set to 1. However, granted that in
that case, the cell edge users may suffer from interference of neighbouring
cells, some approaches to mitigate these interferences may be required.
Three approaches to Inter-Cell Interference (ICI) mitigation are currently
being considered.
randomization,
cancellation,
co-ordination/avoidance.
In addition, the use of beam-forming antenna solutions at the base station is a
general method that can also be seen as a means for downlink inter-cell-
interference mitigation.
It should be noted that the different approaches could, at least to some extent,
complement each other i.e. they are not necessarily mutually exclusive.
4 E-UTRAN
105
ICI randomisation aims at randomising the interfering signal(s) and thus to
allow for interference suppression at the UE in line with the processing gain.
Methods considered for inter-cell-interference randomisation includes:
Cell-specific scrambling, applying (pseudo) random scrambling after
channel coding/interleaving
Cell-specific interleaving, also known as Interleaved Division
Multiple Access (IDMA)
A third means for randomization is to apply different kinds of frequency
hopping.
ICI cancellation aims at interference suppression at the UE beyond what can
be achieved by just exploiting the processing gain.
Two methods have been discussed
Spatial suppression by means of multiple antennas at the UE.
Interference cancellation based on detection/subtraction of the inter-
cell interference. One example is the application of cell-specific
interleaving (IDMA) to enable inter-cell-interference cancellation.
The common theme of ICI co-ordination/avoidance is to apply restrictions
to the downlink resource management (configuration for the common
channels and scheduling for the non common channels) in a coordinated way
between cells. These restrictions can be in the form of restrictions to what
time/frequency resources are available to the resource manager or restrictions
on the transmit power that can be applied to certain time/frequency resources.
Such restrictions in a cell will provide the possibility for improvement in SIR,
and cell-edge data-rates/coverage, on the corresponding time/frequency
resources in a neighbour cell.
The coordination between the cells can range from a static coordination to a
more or less dynamic coordination based on different types of measurements,
e.g. UE measurements and traffic distribution.
ICIco ICIco ICIco ICIco- -- -ordination/avoidanceexamples ordination/avoidanceexamples ordination/avoidanceexamples ordination/avoidanceexamples
Example1 Example1 Example1 Example1
When a request for time-frequency resource (chunk) takes place, it is
suggested that the chunks not used in adjacent cells should be granted at first,
as shown in Fig. 4-12. Synchronization between adjacent base stations makes
it possible to dynamically allocate chunks over the entire frequency band.
LTE/EPS Technology

106
eNB 1 eNB 2
t
i
m
e
frequency
used by eNB 1 used by eNB 2 spare

Figure 4-12 Chunk allocation
When the system is heavy-loaded, the same chunk has to be reused in
neighbouring cells. In this scenario, whitening techniques should be adopted
to distinguish the NodeBs using the same chunk. And some non-orthogonal
multiple access schemes, such as IDMA and scrambling, could be considered
for inter-cell separation.
eNB 1 eNB 2
used by eNB 1 used by eNB 2
multiplexing
eNB 1 & eNB 2
t
i
m
e
frequency

Figure 4-13 Chunk allocation (heavy load)
Example2 Example2 Example2 Example2
When in a heavy load condition, the network is forced to allocate the same
chunk twice in two neighbouring cells, instead of just relying on ICI
randomisation, it is possible to optimise the resource allocation. The
optimisation of resource is based on measurements performed by the UE and
communicated to the eNB (CQI, path loss, average interference, etc.)
4 E-UTRAN
107
t
i
m
e
frequency

Figure 4-14 Allocation optimisation (before)
t
i
m
e
frequency

Figure 4-15 Allocation optimisation (after)
Exa Exa Exa Example3 mple3 mple3 mple3
A slightly reduced variant of the method presented above leads to, so called
soft frequency reuse method. In that method the total available bandwidth is
divided first into primary band and secondary band. The primary band is
planned with frequency reuse pattern of 1/3 and served by high power
transmission with good SNR. The secondary band is planned with frequency
reuse pattern of 1/1 and is using remaining power.
LTE/EPS Technology

108
1/1
1/1 1/1
1/3
1/3 1/3

Figure 4-16 Soft frequency reuse (part 1)
The chunks on primary band are then mostly allocated to the cell edge users,
whereas the chunks on secondary band are allocated for the cell centre users.
The measurement reported by UE are then used to switch the users between
primary and secondary band in case if their position in the cell is changed.
The entire concept is very similar to Overlaid/Underlaid (OL/UL) or
Inner/Outer cell concept known from GERAN.
t
i
m
e
frequency
1/3 1/3 1/1 1/1

Figure 4-17 Soft frequency reuse (part 2)
4 E-UTRAN
109
LTEphysicallayer LTEphysicallayer LTEphysicallayer LTEphysicallayer
The multiple access scheme for the LTE physical layer is based on OFDM
with a Cyclic Prefix (CP) in the downlink, and on SC-FDMA with a CP in the
uplink.
Basicstructuresandparameters Basicstructuresandparameters Basicstructuresandparameters Basicstructuresandparameters
Resourcegrid Resourcegrid Resourcegrid Resourcegrid
In the downlink direction, the transmitted signal in each slot is described by a
resource grid of
RB
SC
DL
RB
N N subcarriers and
DL
symb
N OFDM symbols, where:

DL
RB
N is a downlink bandwidth configuration, expressed in multiples of
RB
sc
N ,

RB
sc
N is a resource block size in the frequency domain, expressed as a
number of subcarriers,

DL
symb
N is a number of OFDM symbols in a downlink slot.
The resource grid structure is illustrated in Fig. 4-18. The
DL
RB
N value is from 6
up to 110 and depends on the downlink transmission bandwidth configured in
the cell.
1 DL slot Tslot
k=0
k=N x N -1
DL
RB
RB
sc
k=N x N -1
DL
RB
RB
sc
Resource block
N OFDM symbols
DL
symb
N OFDM symbols
DL
symb
N x N resource elements
DL
symb
RB
sc
N





s
u
b
c
a
r
r
i
e
r
s
R
B
s
c
N





s
u
b
c
a
r
r
i
e
r
s
R
B
s
c
R
B
s
c
N




x

N




s
u
b
c
a
r
r
i
e
r
s
D
L
R
B
R
B
s
c
N




x

N




s
u
b
c
a
r
r
i
e
r
s
D
L
R
B
R
B
s
c
l=0 l=N -1
DL
symb
l=N -1
DL
symb
Resource element (k,l)

Figure 4-18 Downlink resource grid
LTE/EPS Technology

110
A simplified view on downlink resource grid is also presented in Fig. 4-19.
On that diagram some of the parameters are taking their most popular values
used for point-to-point transmission.
f
t
12 subcarriers, 180 kHz
O
n
e

s
l
o
t
(
T
s
l
o
t
=

0
.
5

m
s
,

7

O
F
D
M

s
y
m
b
o
l
s
)
Resource block
(12 x 7 = 84 resource elements)
Resource element
QPSK 2 bits,
16QAM 4 bits,
64QAM 6 bits,
15 kHz

Figure 4-19 Resource grid (simplified)
The number of OFDM symbols in a slot depends on the cyclic prefix length
and subcarrier spacing configured, see Fig. 4-20. For the typical carrier
spacing 15 kHz and normal CP,
RB
sc
N =12 and i
DL
symb
N =7.
3 24 f=7.5 kHz
6 12 f=15kHz
Extended CP
7 12 f=15kHz Normal CP
Configuration
3 24 f=7.5 kHz
6 12 f=15kHz
Extended CP
7 12 f=15kHz Normal CP
Configuration
RB
sc
N
DL
symb
N

Figure 4-20 Physical RB parameters
In the uplink direction, the transmitted signal in each slot is described by a
similar resource grid of
RB
sc
UL
RB
N N subcarriers and
UL
symb
N SC-FDMA symbols.
Resourceblocks Resourceblocks Resourceblocks Resourceblocks
Resource blocks are used to describe the mapping of certain physical channels
to resource elements. Physical and virtual resource blocks are defined.
Physical resource blocks is identified in the frequency domain by physical
resource block number
PRB
n , that takes values from 0 to 1
DL
RB
N .
4 E-UTRAN
111
A virtual resource block is of the same size as a physical resource block.
Virtual resource blocks are numbered from 0 to 1
DL
RB
N . Two types of virtual
resource blocks are defined:
Virtual resource blocks of localized type
Virtual resource blocks of distributed type
Virtual resource blocks of localized type are mapped directly to physical
resource blocks such that virtual resource block
VRB
n corresponds to physical
resource block
VRB PRB
n n = .
s
u
b
c
a
r
r
i
e
r
s
symbols

Figure 4-21 Localised virtual RB mapping to physical RB
Virtual resource blocks of distributed type are mapped to physical resource
blocks such that virtual resource block
VRB
n corresponds to physical resource
block ) , (
s VRB PRB
n n f n = , where
s
n is the slot number within a radio frame. The
virtual-to-physical resource block mapping is different in the two slots of a
subframe.
LTE/EPS Technology

112
s
u
b
c
a
r
r
i
e
r
s
symbols

Figure 4-22 Distributed virtual RB mapping to physical RB
Radioframes Radioframes Radioframes Radioframes
The size of various fields in the time domain is expressed as a number of time
units ( ) N f T
s
= / 1 , where f =15 kHz (subcarrier spacing) and N=2048
(maximum FFT size). In frequency domain, the size is expressed as multiples
of f . Physically,
s
T represents somehow the achievable data rate period that
could handle the system for a binary modulation.
The radio frame structure type 1 is used for FDD (for both full duplex and
half duplex operation) and has a duration of 10 ms and consists of 20 slots
with a slot duration of 0.5 ms, numbered from 0 to 19. Two adjacent slots
form one sub-frame of length 1ms.
#0 #1 #2 #3 #18 #19
subframe
slot, Tslot = 0.5 ms
radio frame, Tf = 10ms

Figure 4-23 Frame structure type 1 (FDD)
4 E-UTRAN
113
Uplink and downlink transmissions are separated in the frequency domain. In
half-duplex FDD operation, the UE cannot transmit and receive at the same
time while there are no such restrictions in full-duplex FDD.
radio-frame, 10 ms
half-frame, 5 ms
subframe slot
subframe
#0
DwPTS
GP
UpPTS
subframe
#1
subframe
#2
subframe
#3
subframe
#4
subframe
#5
subframe
#6
subframe
#7
subframe
#8
subframe
#9

Figure 4-24 Frame structure type 2 (TDD)
Frame structure type 2 is applicable to TDD. Each radio frame of length 10
ms consists of two half-frames of length 5 ms each. Each half-frame consists
of five subframes of length 1 ms. The supported uplink-downlink
configurations are listed in Fig. 4-25 where, for each subframe in a radio
frame, D denotes the subframe is reserved for downlink transmissions, U
denotes the subframe is reserved for uplink transmissions and S denotes a
special subframe with the three fields DwPTS, GP and UpPTS with the total
length of 1 ms. All subframes, which are not special subframes, are defined as
two slots of length 0,5 ms in each subframe.
Uplink-downlink configurations with both 5 ms and 10 ms downlink-to-
uplink switch-point periodicity are supported.
In case of 5 ms downlink-to-uplink switch-point periodicity, the special
subframe exists in both half-frames.
In case of 10 ms downlink-to-uplink switch-point periodicity, the special
subframe exists in the first half-frame only.
Subframes 0 and 5 and DwPTS are always reserved for downlink
transmission. UpPTS and the subframe immediately following the special
subframe are always reserved for uplink transmission.
LTE/EPS Technology

114
D D D D D D D U S D 10 ms 5
D U U S D U U U S D 5 ms 6
D D D D D D U U S D 10 ms 4
D D D D D U U U S D 10 ms 3
D D U S D D D U S D 5 ms 2
D U U S D D U U S D 5 ms 1
U U U S D U U U S D 5 ms 0
9 8 7 6 5 4 3 2 1 0
Subframe number
DL-to-UL switching
periodicity
UL/DL
conf.
D D D D D D D U S D 10 ms 5
D U U S D U U U S D 5 ms 6
D D D D D D U U S D 10 ms 4
D D D D D U U U S D 10 ms 3
D D U S D D D U S D 5 ms 2
D U U S D D U U S D 5 ms 1
U U U S D U U U S D 5 ms 0
9 8 7 6 5 4 3 2 1 0
Subframe number
DL-to-UL switching
periodicity
UL/DL
conf.

Figure 4-25 Uplink-downlink allocations (TDD)
Referencesymbols Referencesymbols Referencesymbols Referencesymbols
Some of the symbols in both DL & UL resource blocks instead of being used
for data transmission are used to transmit predefined signals (i.e. known by
both transmitter and receiver), that are known as reference symbols or pilot
symbols. These signals are required for the following three purposes:
channel quality measurements,
channel estimation for coherent demodulation/detection,
cell search and initial acquisition.
The reference symbols are arranged in the time-frequency domain so that they
are time and frequency spaced, allowing correct interpolation of the channel.
resource element
resource blocks
symbols
c
a
r
r
i
e
r
s
reference signal

Figure 4-26 Reference signal for 1 Tx antenna system
4 E-UTRAN
115
MIMO MIMO MIMO MIMO
In the context of wireless transmissions, it is common knowledge that
depending on the surrounding environment, a transmitted radio signal usually
propagates through several different paths before it reaches the receiver,
which is often referred to as multipath propagation. The radio signal
received by the receiver antenna consists of the superposition of the various
multipaths with different phase shifts. In such environment, the channel gain
can sometimes become very small so that a reliable transmission is not always
possible. To deal with this problem, communication engineers have thought
of many possibilities to increase the so-called diversity. The higher the
diversity is, the lower is the probability of a small channel gain.
Some common diversity techniques are time diversity and frequency
diversity, where the same information is transmitted at different time instants
or in different frequency bands, as well as spatial diversity, where one relies
on the assumption that fading is at least partly independent between different
points in space.
The concept of spatial diversity leads directly to an expansion of the Single
Input Single Output (SISO) system. This enhancement is denoted as Single
Input Multiple Output (SIMO) system. In such a system, we equip the
receiver with multiple antennas. Doing so usually can be used to achieve a
considerable performance gain, i.e. better link budget, but also co-channel
interference can be better combated. At the receiver, the signals are combined
(i.e. if the phases of the transmission are known, in a coherent way) and the
resulting advantage in performance is referred to as the diversity gain
obtained from independent fading of the signal paths corresponding to the
different antennas. This idea is well known and is used in many established
communication systems, for example in the GSM and also UMTS. It is clear
that in the above described way, a base station can improve the uplink
reliability and signal strength without adding any cost, size or power
consumption to the mobile device.
As far as the ability to achieve performance in terms of diversity is concerned,
system improvements are not only limited to the receiver side. If the
transmitter side is also equipped with multiple antennas, we can either be in
the Multiple Input Single Output (MISO) or Multiple Input Multiple Output
(MIMO) case. A lot of research has been performed in recent years to exploit
the possible performance gain of transmit diversity. The ways to achieve the
predicted performance gain due to transmit diversity are various. Most of
them are, loosely speaking, summarized under the concept of Space-Time
Coding (STC).
LTE/EPS Technology

116
SISO SIMO
MISO MIMO

Figure 4-27 Multiple antenna systems classification
Besides the advantages of spatial diversity in MIMO systems, they can also
offer a remarkably gain in terms of information rate or capacity. This
improvement is linked with the afore mentioned multiplexing gain. In fact, the
advantages of MIMO are far more fundamental as it may have appeared to the
reader so far. The underlying mathematical nature of MIMO systems, where
data is transmitted over a matrix rather than a vector channel, creates new and
enormous opportunities beyond the just described diversity effects.
Ba Ba Ba BasicMIMOmodel sicMIMOmodel sicMIMOmodel sicMIMOmodel
A simplified vision of a 2x2 MIMO system is shown in Fig. 4-28.
Tx Rx
S1
S2
Z1
Z2
h11
h22
h12
h21

Figure 4-28 2x2 MIMO basic model
4 E-UTRAN
117
The base station transmits two different signals via two antennas. The symbol
transmitted on the first antenna port is denoted by
1
s , and the symbol
transmitted on the second antenna port is denoted by
2
s . Consequently, the
symbol received are denoted by
1
z and
2
z .
In the simplified model, there are four channel path. The channel response for
each path is denoted by
r t
h
,
, where t is the transmit antenna port number and r
is a receive antenna port number.
The entire transmission process can be described by the set of two equations
(one equation for each RX antenna):
or simply speaking, by the set of two equations (one for each RX antenna):

+ =
+ =
2 22 1 12 2
2 21 1 11 1
s h s h z
s h s h z

Assuming, that the receiver has accurate channel estimates, based on those
estimates and the received symbol values, receiver is able to solve the above
set of equations and get the values of the originally transmitted symbols.
Thus, theoretically, by using 2x2 MIMO, it is possible to double the
transmission rate.
Referencesignal Referencesignal Referencesignal Referencesignal
In case of multiple transmit antennas, there are separate reference signal
patterns for each antenna port. Additionally each antenna element remains
completely silent on resource element used as a reference signal on another
antenna. Thanks to this arrangement a transmission path from any
transmitting antenna to any receiving antenna can be easily measured and
estimated separately.
For example, in order to estimate the
11
h and
12
h values correctly, receiver
has to wait for the moment when the first antenna transmits the reference
signal. The set of equations from the previous section is than simplified, as the
second antenna is silent (i.e. there is no
2
s ):

=
=
1 12 2
1 11 1
s h z
s h z
,
and the
11
h and
12
h values can be easily calculated. In order to calculate the
remaining
r t
h
,
values it is necessary to repeat this procedure, separately for
each transmitting antenna.
LTE/EPS Technology

118
antenna port 1 antenna port 2

Figure 4-29 Reference signals for 2 Tx antennas system
antenna port 1 antenna port 2 antenna port 3 antenna port 4

Figure 4-30 Reference signals for 4 Tx antennas system
Transmission with multiple input and multiple output antennas (MIMO) are
supported with configurations in the downlink with two or four transmit
antennas and two or four receive antennas, which allow for multi-layer
transmissions with up to four streams. Multi-user MIMO i.e. allocation of
different streams to different users is supported in both UL and DL.
E EE E- -- -MBMS MBMS MBMS MBMS
To support a Multimedia Broadcast and Multicast Service (MBMS), LTE
offers the possibility to transmit Multicast/Broadcast over a Single Frequency
Network (MBSFN), where a time-synchronized common waveform is
transmitted from multiple cells for a given duration. MBSFN transmission
enables highly efficient MBMS, allowing for over-the-air combining of multi-
cell transmissions in the UE, where the cyclic prefix is utilized to cover the
difference in the propagation delays, which makes the MBSFN transmission
appear to the UE as a transmission from a single large cell.
4 E-UTRAN
119
soft
combining
same content &
synchronisation
f1
f1
f1

Figure 4-31 E-MBMS with SFN
Transmission on a dedicated carrier for MBSFN with the possibility to use a
longer CP with a sub-carrier bandwidth of 7.5 kHz is supported as well as
transmission of MBSFN on a carrier with both MBMS transmissions and
point-to-point transmissions using time division multiplexing.
The 7.5 kHz sub-carrier spacing option, with the longer CP (16.67 s) and
longer symbol duration (133 s), is more tolerant to dispersion characteristics
of the very large cell environment, however at the same time is more sensitive
to frequency offset. That is why the 7.5 kHz sub-carrier spacing option should
target multi-cell MBMS for rural areas and low data rate application.
The 15 kHz sub-carrier spacing, with the short CP (5.21 s) accommodate
less delay spread and is suitable for urban areas and high data rate
applications.
Channels Channels Channels Channels
As for the most radio communication systems, the radio interface of
E-UTRAN faces many challenges. In terms of requirements, the E-UTRAN
shall be able to transmit high-rate and low-latency information in the most
efficient way. However, not all the information flows require the same
protection against transmission errors or QoS handling.
In general, it is crucial, especially in the case of radio mobility, that the
E-UTRAN signalling message are transmitted as fast as possible, using the
best error-protection scheme. On the other hand, voice or data streaming
applications can accept a reasonable frame loss due to radio transmission.
Interactive connection-oriented applications (such as Web browsing) are also
different, as the end-to-end retransmission can help to recover from radio
propagation problem issues.
LTE/EPS Technology

120
In order to be flexible and allow different schemes for data transmission, the
E-UTRAN specification introduce several types of channels:
logical channels,
transport channels,
physical channels.
Logicalchannels Logicalchannels Logicalchannels Logicalchannels
Logical channels are described by the type of information they carry, or in
other words they corresponds to data-transfer services offered by the radio
interface protocols to upper layers. Logical channels can be divided into two
categories: the control channels (for the transfer of control plane information)
and the traffic channels (for the transfer of user plane information).
Control logical channels
BCCH Broadcast Control Channel
PCCH Paging Control Channel
CCCH Common Control Channel
MCCH Multicast Control Channel
DCCH Dedicated Control Channel
Traffic logical channels
DCCH Dedicated Traffic Channel
MTCH Multicast Traffic Channel

Figure 4-32 Logical channels
The E-UTRAN logical control channels are:
Broadcast Control Channel (BCCH) This is a downlink common
channel, used by the network to broadcast E-UTRAN system
information to the terminals present in the radio cell. This information
is used by the terminal, e.g. to know serving cell network operator, to
get information about the configuration of the cell common channels,
how to access to the network, etc.
Paging Control Channel (PCCH) is a downlink common channel
which transfers paging information to terminals present in the cell, e.g.
in case of mobile-terminated communication session.
4 E-UTRAN
121
Common Control Channel (CCCH) is a bi-directional channel, used
to establish connection between UE and E-UTRAN.
Multicast Control Channel (MCCH) is a downlink channel used
for the transmission of Multimedia Broadcast and Multicast Service
(MBMS) information to one or several terminals.
Dedicated Control Channel (DCCH) is a point-to-point bi-
directional channel supporting control information between a given
terminal and the network. In the DCCH context, the control
information only includes the 3GPP specific signalling (RRC and
NAS). The application level signalling (e.g. SIP and SDP) is not
handled by the DCCH.
The E-UTRAN logical traffic channels are:
Dedicated Traffic Channel (DCCH) is a point-to-point bi-
directional channel, used between a given terminal and the network. It
can support the transmission of user data, which include the data
themselves as well as application level signalling associated to data
flow.
Multicast Traffic Channel (MTCH) is a point-to-multipoint data
channel for the transmission of traffic data from the network to one or
several terminals. As for the MCCH, this channel is associated to the
MBMS service.
Transportchannels Transportchannels Transportchannels Transportchannels
Transport channels are described by how and with what characteristics data
are transferred over the radio interface. For example, the transport channels
describe how the data are protected against transmission errors, the type of
channel coding, CRC protection or interleaving which is being used, the size
of data packets sent over the radio interface, etc. All this set of information is
known as the Transport Format (TF).
LTE/EPS Technology

122
RACH Random Access Channel
UL-SCH Uplink Shared Channel
DCCH Dedicated Control Channel
Transport channels
BCH Broadcast Channel
PCH Paging Channel
MCH Multicast Channel
DL-SCH Downlink Shared Channel

Figure 4-33 Transport channels
The E-UTRAN transport channels are:
Broadcast Channel (BCH) is a downlink channel associated to the
BCCH logical channel. The BCH has a fixed and predefined TF, and
covers the whole cell area.
Paging Channel (PCH) is a downlink channel associated to the
PCCH.
Multicast Channel (MCH) is a downlink channel associated to
MBMS traffic or control information transfer.
Downlink Shared Channel (DL-SCH) is a downlink channel used
to transport traffic or control information.
Uplink Shared Channel (UL-SCH) is an uplink equivalent of the
DL-SCH.
Random Access Channel (RACH) is an uplink channel is a
specific channel supporting limited control information, e.g. during
early phases of communication establishment or in case of RRC state
change.
Physicalchannels Physicalchannels Physicalchannels Physicalchannels
The physical channels correspond to a set of resource elements carrying
information originating from higher layers. The physical channels are the
actual implementation of the transport channels over the radio interface. They
are only known to the physical layer of E-UTRAN and their structure is
tightly dependent on physical interface OFDMA/SC-FDMA characteristics.
4 E-UTRAN
123
Uplink physical channels
PUSCH Physical Uplink Shared Channel
PUCCH Physical Uplink Control Channel
PRACH Physical Random Access Channel
Downlink physical channels
PDSCH Physical Downlink Shared Channel
PBCH Physical Broadcast Channel
PMCH Physical Multicast Channel
PCFICH Physical Control Format Indicator Channel
PDCCH Physical Downlink Control Channel
PHICH Physical Hybrid ARQ Indicator Channel

Figure 4-33 Physical channels
The following downlink physical channels are defined:
Physical Downlink Shared Channel (PDSCH) which carries user
data and higher-layer signalling. As for the HSDPA system, the radio
channel is allocated dynamically in an opportunistic way, i.e. its is a
channel with PS characteristics.
Physical Broadcast Channel (PBCH) which carries BCH transport
channel and BCCH logical channel information, i.e. System
Information messages,
Physical Multicast Channel (PMCH) which carries
multicast/broadcast information,
Physical Control Format Indicator Channel (PCFICH) which
informs the UE about the number of OFDM symbols used for the
PDCCH.
Physical Downlink Control Channel (PDCCH) - which carries
scheduling assignments for the uplink,
Physical Hybrid ARQ Indicator Channel (PHICH) which carries
ACK and NACK eNB responses to uplink transmission, relative to the
HARQ mechanism.
The following uplink physical channels are defined:
Physical Uplink Shared Channel (PUSCH) which carries user data
and higher-layer signalling,
Physical Uplink Control Channel (PUCCH) which carries control
information, including ACK and NACK responses from the terminal
to downlink transmission, relative to HARQ mechanism,
Physical Random Access Channel (PRACH) which carries the
random access preamble sent by the terminals to access to the
network.
LTE/EPS Technology

124
In addition to physical channels, the physical, the physical layer makes use of
physical signals. A signal corresponds to a set of resource elements used by
the physical layer but does not carry information originating from higher
layers. The following physical signals are defined:
Reference signal (DL & UL),
Synchronization signal (DL only).
Channelmapping Channelmapping Channelmapping Channelmapping
Fig. 4-35 represents the mapping between logical, transport and physical
channels presented above.
Logical channels Logical channels
Physical channels Physical channels
Transport channels Transport channels
PCCH BCCH CCCH DTCH DCCH MCCH MTCH
PCH BCH DL-SCH UL-SCH MCH
PDSCH PBCH
PMCH PRACH
RACH
DL-PSCH UL-PSCH

Figure 4-35 E-UTRAN channel mapping
PCCH and BCCH logical channels have particular transport and physical
characteristics so that the transport and physical channel mapping is specific
to them. The mapping of the BCCH on the BCH. The mapping of the BCCH
on the BCH and DL-SCH transport channel is not an option. This comes from
the fact that the System Information (SI) is actually composed of two parts:
Critical system information which has a fixed format and requires
frequent update this one is mapped on the PBCH.
Dynamic and less critical information which is mapped on a transport
channel offering more flexibility in terms of bandwidth and repetition
period the DL-SCH.
On the other hand, some logical channels can benefit from different possible
options as regards to mapping to the transport channel. Typically, this is the
case for the MCCH and MTCH channels, which are mapped on a specific
MCH transport channel in case of multi-cell MBMS service provision. When
4 E-UTRAN
125
an MBMS service is provided in a single cell, MCCH and MTCH channels
are mapped over conventional DL-SCH channels.
The other physical channels (such as PUCCH, PDCCH, PCFICH and PHICH)
do not carry information from upper layers (such as RRC signalling or user
data). They are only intended for the purpose of physical layer, as they carry
information related to the coding of physical blocks, or HARQ related
information. This is the reason why those channels are not mapped to any of
the transport channels.
The RACH is a specific case of transport channel, having no logical channel
equivalent. This comes from the fact that the RACH only carriers RACH
preamble (which is basically the very first set of bits the terminal sends to the
network to request access). Once access is granted by the network and
physical uplink resources are allocated to the terminal, the RACH is no longer
used by the terminal.
E EE E- -- -UTRANandUTRANchannels UTRANandUTRANchannels UTRANandUTRANchannels UTRANandUTRANchannels
The E-UTRAN channel model has been inherited from the UTRAN channel
model. The concept of separation between logical, transport and physical
channels was already present in the initial UTRAN model.
Logical channels Logical channels
Physical channels Physical channels
Transport channels Transport channels
BCCH PCCH CTCH CCCH DTCH MCCH MSCH MTCH DCCH
BCH PCH FACH DCH HS-DSCH
P-CCPCH S-CCPCH DPCH HS-PDSCH

Figure 4-36 UTRAN channel mapping (downlink)
LTE/EPS Technology

126
DCH
DPDCH PRACH E-DPDCH
Logical channels Logical channels
Physical channels Physical channels
DCCH CCCH DTCH
RACH E-DCH
Transport channels Transport channels

Figure 4-37 UTRAN channel mapping (uplink)
UTRAN and E-UTRAN models share almost the same logical channel
structure, showing that radio layers from both systems will actually provide
the same types of services to upper layers, i.e.:
Broadcast and paging services (associated to BCCH and PCCH),
which are the basis of all cellular systems,
Dedicated or point-to-point information transfer (supported by
DCCH and DTCH).
Multicast or point-to-multipoint information transfer (supported by
MCCH and MTCH).
However, when looking at the transport channel level, the two models are
completely different. The DCH present in the UTRAN model has disappeared
from the E-UTRAN model, which only supports shared transport channels.
This channel was designed for constant bit rate and real-time constraining
services, such as voice or streaming applications.
In the E-UTRAN model, all point-to-point data services are packetized, and
supported by only one kind of transport channel: DL/UL-SCH. This is an
interesting evolution, as the radio interface concepts are following the same
all-IP direction as the Packet Core and service evolution. This newly
introduced DL/UL-SCH can actually be seen as an evolution of both HS-
DSCH and E-DCH, supporting HSDPA and HSUPA respectively.
At the end, the channel model of E-UTRAN looks much simpler, as the
number of transport channels and cross-mapping between channel types has
been greatly simplified and reduced.
4 E-UTRAN
127
Datatransfer Datatransfer Datatransfer Datatransfer
Linkadaptation Linkadaptation Linkadaptation Linkadaptation
In a cellular system, the radio channel conditions experienced by different
downlink communication links will typically vary significantly, both in time
and between different positions within the cell. In general, there are several
reasons for these variations and differences in instantaneous radio channel
conditions:
The channel conditions will differ significantly between different
positions within the cell, due to distance dependent path loss and
location dependent shadowing.
The channel conditions will vary due to variations in the interference
level. The interference level will depend on the position within the
cell, with typically higher interference level close to the cell border.
However, the interference level will also depend on the instantaneous
transmission activity of neighbour cells. The transmission activity of a
cell could vary significantly, especially when bursty high rate data
traffic contributes a major part of the overall traffic. Note that there
may not only be interference from other cells. In case of a time
dispersed channel, downlink orthogonality will be lost, causing own
cell interference.
The instantaneous channel conditions will vary rapidly due to
multipath fading. The rate of these variations depends on the speed of
the mobile terminal. Typically there will be significant variations
during a fraction of a second.
In 2G and 3G (non-HSPA) systems, power control is used to compensate for
differences and variations in the instantaneous downlink radio channel
conditions. In principle, power control allocates a proportionally larger part of
the total available cell power to communication links with bad channel
conditions. This ensures similar service quality to all communication links,
despite differences in the radio channel conditions. At the same time, radio
resources are more efficiently utilized when they are allocated to
communication links with good channel conditions. Thus, from an overall
system throughput point of view, power control is not the most efficient
means to allocate available resources.
In general, the goal is to ensure sufficient received energy per information bit
for all communication links, despite variations and differences in the channel
LTE/EPS Technology

128
conditions. Power control achieves this by adjusting the transmission power
while keeping the data rate constant.
For services that do not require a specific data rate, such as many best effort
services, adjusting the data rate, while keeping the transmission power
constant, can also control the energy per information bit. This can be referred
to as rate control and rate adjustment. It is also often referred to as (fast) link
adaptation, although, in principle, power control can also be seen as a kind of
link adaptation.
user data coding

Figure 4-38 Link adaptation
There are different means by which the data rate can be adjusted to
compensate for variations and differences in the instantaneous channel
conditions:
by adjusting the channel coding rate - the use of channel coding with
higher coding rate allows for higher data rates at the expense of less
robustness to channel impairments,
by adjusting the modulation scheme - the use of higher order
modulation, such as 16QAM, allows for more bits per modulation
symbol and thus for higher data rates. However, this is achieved at the
expense of less robustness to channel impairments.
HARQ HARQ HARQ HARQ
Hybrid Automatic Repeat Request (HARQ) is a technique combining
Forward Error Correction (FEC) and ARQ methods that save information
from previous failed attempts to be used in future decoding.
HARQ is an implicit link adaptation technique. Whereas conventional link
adaptation uses explicit C/I or similar measurements to set the modulation and
4 E-UTRAN
129
coding format, HARQ uses link layer acknowledgements (ACK/NACK) for
retransmission decisions. Put another way, conventional link adaptation
provides the coarse data rate selection, while HARQ provides fine data rate
adjustment based on channel conditions.
Data Block #1
Data Block #2
Data Block #3
NACK
Data Block #2
r
e
t
r
a
n
s
m
i
s
s
i
o
n
ACK

Figure 4-39 HARQ with soft combining
For a re-transmission, HARQ uses the same transport-block set - and thus the
same number of information bits - as were used in the initial transmission.
However, it may use a different modulation scheme, channelisation code set
(including the size of the channelisation code set), or transmission power. As
a result, the number of channel bits available for a re-transmission may differ
from that of the initial transmission. (channel bits are the bits actually
transmitted over the air.) Moreover, even if the number of channel bits
remains the same, the channel bit set may be different.
turbo encoder
original transmission
rate matching (puncturing)
retransmission
Chase Combining (CC)
systematic
parity 1
parity 2

Figure 4-40 Chase combining principle (not used in E-UTRAN)
LTE/EPS Technology

130
turbo encoder
original transmission
rate matching (puncturing)
retransmission
Incremental Redundancy combining (IR)
systematic
parity 1
parity 2

Figure 4-41 Incremental redundancy principle (used in E-UTRAN)
To minimize the number of additional retransmission requests, HARQ uses
one of two soft combining schemes to ensure proper message decoding:
Chase Combining (CC) involves sending an identical version of an
erroneously detected packet; received copies are combined by the
decoder prior to decoding.
Incremental Redundancy (IR) involves sending a different set of bits
incrementally to be combined with the original set, thus increasing the
amount of redundant data and the likelihood of recovering from errors
introduced on the air.
The HARQ mechanism in 3G HSPA makes use of both CC and IR. The
advantage of CC is that requires less ultra fast memory for the soft combining
process, however it is less efficient in error correction in comparison to IR.
The E-UTRAN makes use of IR only.
Scheduling Scheduling Scheduling Scheduling
The eNB scheduler (for unicast transmission) dynamically controls which
time/frequency resources are allocated to a certain user at a given time.
Downlink control signalling informs UEs what resources and respective
transmission formats have been allocated. The scheduler can dynamically
choose the best multiplexing strategy from the available methods, e.g.
localised or distributed allocation. Obviously, scheduling is tightly interacting
with link adaptation and HARQ.
4 E-UTRAN
131
The decision of which user transmission to multiplex within a given subframe
may, for example, be based on:
minimum and maximum data rate,
available power to share among mobiles,
BER target requirements according to the service,
latency requirements, depending on the service,
QoS parameters and measurements,
payload buffered in the eNB/UE ready for scheduling,
pending retransmissions,
CQI (Channel Quality Indicator) reports from the UEs,
UE capabilities,
UE sleep cycles and measurement gaps/periods.
Methods to reduced the control signalling overhead, e.g. pre-configuring the
scheduling instants (persistent scheduling for applications like VoIP, for
instance), similar to methods defined for UTRAN/HSPA Continuous Packet
Connectivity (CPC) are still possible.

Figure 4-42 Fast channel dependent scheduling
LTE LTE LTE LTE- -- -Uuprotocols Uuprotocols Uuprotocols Uuprotocols
Fig. 4-43 is an overview of radio protocol structure.
Starting from the top of the picture, the Radio Resource Control (RRC)
supports all the signalling procedures between the terminal and eNB. This
includes mobility procedures as well as terminal connection management. The
LTE/EPS Technology

132
signalling from the EPC Control Plane (e.g. for terminal registration or
authentication) is transferred to the terminal through the RRC protocol, hence
the link between the RRC and upper layers.
The Packet Data Convergence Protocol (PDCP) layer (whose main role
consists of header compression and implementation of security such as
encryption and integrity) is offered to radio bearers by E-UTRAN lower
layers. Each of these bearers corresponds to a specific information flow such
as User plane data (e.g. voice frames, streaming data, IMS signalling) or
Control plane signalling (such as RRC or NAS signalling). Due to their
specific purpose and handling, information flows generated by System
Information Broadcast and Paging functions are transparent to the PDCP
layer.
The Radio Link Control (RLC) layer provides to the PDCP layer basic OSI-
like L2 services such as packet data segmentation and Automatic Repeat
Request (ARQ) as an error correction mechanism. There is one-to-one
mapping between each RLC input flow and logical channel provided by RLC
to the MAC layer.
The Medium Access Control (MAC) layers main task is to map and
multiplex the logical channels onto the transport channels after having
performed priority handling on the data flows received from the RLC layer.
The MAC also supports HARQ, which is a fast repetition process.
Finally, the MAC delivers the transport flows to the Physical layer, which will
apply the channel coding and modulation before transmission over the radio
interface.
channel
coding
channel
coding
channel
coding
HARQ
scheduling / priority handling
MUX
HARQ HARQ
Segm.
ARQ
Segm.
ARQ
Segm.
ARQ
Segm.
ARQ
Ciphering,
integrity
ROHC,
ciphering
ROHC,
ciphering
ROHC,
ciphering
Paging
System info
broadcast
RRC
Control plane User plane
RRC
PDCP
RLC
MAC
PHY
radio bearers
logical channels
transport channels
physical channels

Figure 4-43 LTE-Uu protocols
5 Core Network

133
Chapter Chapter Chapter Chapter5 55 5
CoreNetwork CoreNetwork CoreNetwork CoreNetwork
Topic Topic Topic Topic Page Page Page Page
MME in Pool.................................................................................................. 135
Signalling Transport (SIGTRAN).................................................................. 143
User data transfer ........................................................................................... 151
QoS ................................................................................................................ 161
LTE/EPS Technology

134

This page is intentionally left blank
5 Core Network

135
MMEinPool MMEinPool MMEinPool MMEinPool
The Intra Domain Connection of RAN Nodes to Multiple CN Nodes,
introduced in UMTS R5, overcomes the strict hierarchy, which restricts the
connection of a RAN node to just one CN node. This restriction in
GSM/UMTS results from routing mechanisms in the RAN nodes which
differentiate only between information to be sent to the PS or to the CS
domain CN nodes and which do not differentiate between multiple CN nodes
in each domain. The Intra Domain Connection of RAN Nodes to Multiple CN
Nodes introduces a routing mechanism (and other related functionality),
which enables the RAN nodes to route information to different CN nodes
within the CS or PS domain, respectively.
RNC RNC RNC RNC
SGSN SGSN
GGSN
RNC RNC
SGSN
GGSN

Figure 5-1 Network hierarchy GSM/UMTS R4-
The Intra Domain Connection of RAN Nodes to Multiple CN Nodes
introduces further the concept of pool-areas which is enabled by the routing
mechanism in the RAN nodes. A pool-area is comparable to an MSC or
SGSN service area as a collection of one or more RAN node service areas. In
difference to an MSC or SGSN service area a pool-area is served by multiple
CN nodes (MSCs or SGSNs) in parallel which share the traffic of this area
between each other. Furthermore, pool-areas may overlap which is not
possible for MSC or SGSN service areas. From a RAN perspective a pool-
area comprises all LA(s)/RA(s) of one or more RNC/BSC that are served by a
certain group of CN nodes in parallel. One or more of the CN nodes in this
group may in addition serve LAs/RAs outside this pool-area or may also serve
other pool-areas. This group of CN nodes is also referred to as MSC pool or
SGSN pool respectively.
LTE/EPS Technology

136
GGSN GGSN
SGSN SGSN SGSN
RNC RNC RNC RNC RNC RNC
Pool area 1
Pool area 2

Figure 5-2 Network hierarchy GSM/UMTS R5+
The Intra Domain Connection of RAN Nodes to Multiple CN Nodes enables a
few different application scenarios with certain characteristics. The service
provision by multiple CN nodes within a pool-area enlarges the served area
compared to the service area of one CN node. This results in reduced inter CN
node updates, handovers and relocations and it reduces the HLR update
traffic. The configuration of overlapping pool-areas allows to separate the
overall traffic into different MS moving pattern, e.g. pool-areas where each
covers a separate residential area and all the same city centre. Other
advantages of multiple CN nodes in a pool-area are the possibility of capacity
upgrades by additional CN nodes in the pool-area or the increased service
availability as other CN nodes may provide services in case one CN node in
the pool-area fails.
A user terminal is served by one dedicated CN node of a pool-area as long as
it is in radio coverage of the pool-area. Fig. 13-3 shows most of the possible
pool-area configurations for GERAN PS traffic. It contains Pool-area 1 (BSC
area 1, 2 and 3 served by SGSNs 1 and 2), Pool-area 2 (BSC area 4 and 5
served by SGSNs 3 and 4) and Pool-area 3 (BSC area 5, 6 and 7 served by
SGSNs 5, 6 and 7). In addition the BSC areas 8 is served by SGSN 7 without
any usage of the SGSNs in Pool feature. The possibility to configure
overlapping pool-areas is shown by the Pool-areas 2 and 3. The Pool-areas 1
is configured non-overlapping with any other Pool-area. The number or
capacity of SGSNs is configured independently for each pool-area. The usage
of SGSNs in Pool may be configured in parts of the network only and can co-
exists with other areas not using this feature.
5 Core Network

137
SGSN7
Pool-area 1 Pool-area 2
Pool-area 3
SGSN2
SGSN1
SGSN4
SGSN3
SGSN6
SGSN5
BSC3
BSC2
BSC1
BSC4 BSC5 BSC8 BSC7
BSC6

Figure 5-3 Pool area configuration example
The fact that the BSC can co-operate with the several SGSN does not implies
that the separate physical interfaces are required since the IP network can be
used between BSCs and SGSNs to switch the traffic delivered on the same
physical interfaces to different recipients connected to that network.
IP network
SGSN2 SGSN1 SGSN3
BSC6 BSC5 BSC4 BSC3 BSC2 BSC1

Figure 5-4 SGSNs in Pool (physical view with Gb/IP)
Similarly to GSM/UMTS, where the MSC/SGSN in Pool is already quite
popular solution, the EPS network may utilise the solution called MME in
Pool. However, some aspects of the CN nodes pool solution for GSM/UMTS
and EPS networks are different:
There is only one CN domain in EPS, that is PS domain, so there is
only necessity for the MME nodes to be pooled,
The MME in Pool concept is introduced in the first release of the
standard for the EPS network, so right from the beginning all MME
are going to support all MME in Pool specific procedures. (In
GSM/UMTS there was a necessity to solve backward compatibility
LTE/EPS Technology

138
problems between MSC/SGSN capable and non-capable of supporting
MSC/SGSN pool are concept.
The temporary UE identity GUTI that holds the binding between the
UE and its serving CN node in EPS has a structure that directly
supports the concept of the MME in Pool, in contradiction to
GSM/UMTS where TMSI/P-TMSI structure was modified for that
purpose. Since new R5 TMSI/P-TMSI structure has to be backward
compatible with R4 structure, the solution is slightly less efficient,
introduces some extra signalling load and in some very rare cases may
result in the situation where some selected subscriber are not subjected
to inter MSC/SGSN load distribution.
MME in Pool
only PS domain in EPS
no problems with backward compatibility
GUTI structure supports the MME in Pool concept
MME in Pool
only PS domain in EPS
no problems with backward compatibility
GUTI structure supports the MME in Pool concept

Figure 5-5 MME in Pool
Poolarea Poolarea Poolarea Poolarea
A pool-area is an area within which a UE may roam without a need to change
the serving MME node. A pool-area is served by one or more MMEs nodes in
parallel. The complete service area of a eNB (i.e. all the cells being served by
one eNB) belongs to the same one or more pool-area(s). A eNB service area
may belong to multiple pool-areas, which is the case when multiple
overlapping pool-areas include this eNB node service area. If TA spans over
multiple eNB service areas then all these eNB service areas have to belong to
the same MME pool-area. Additionally, when the TA list, the UE is registered
to, spans over multiple eNB service areas then also all these eNB service
areas have to belong to the same MME pool area.
5 Core Network

139
An MME pool-area is an area within which an MS roams
without a need to change the serving MME.
MME
MME
MME
eNB
eNB
eNB
eNB
eNB

Figure 5-6 MME pool area
MMEselectionanda MMEselectionanda MMEselectionanda MMEselectionandaddressing ddressing ddressing ddressing
Each time the UE leaves the current MME pool area, the eNB runs MME
selection function. The MME selection function selects an available MME for
serving a UE. The selection is based on network topology, i.e. the selected
MME serves the UEs location and in case of overlapping MME service
areas, the selection may prefer MMEs with service areas that reduce the
probability of changing the MME.
The selected MME allocates a Globally Unique Temporary Identity (GUTI)
to the UE. The GUTI has two main components:
Globally Unique MME Identifier (GUMMEI) uniquely identifying the
MME which allocated the GUTI,
M-TMSI uniquely identifying the UE within the MME that allocated
the GUTI.
GUMMEI
MCC MNC MMEGI MMEC M-TMSI
MMEI
S-TMSI
GUMMEI Globally Unique MME Identifier
MMEI MME Identifier
MMEGI MME Group ID
MMEC MME Code

Figure 5-7 GUTI structure
LTE/EPS Technology

140
The GUTI structure directly supports the concept of the MME pool area.
Since during each identification the UE, not only identifies itself but also the
MME that has allocated its temporary identity. Therefore, even in case of
intra MME pool area mobility, each eNB easily can route the data from the
UE to the MME which holds the user subscription and session information.
eNB
eNB

GUTI (GUMMEI #2)


(GUMMEI #1)

MME selection
GUTI/GUMMEI allocation
GUMMEI routing
MME
MME
(GUMMEI #2)
MME
(GUMMEI #3)
GUTI (GUMMEI #2)


Figure 5-8 MME in Pool and GUTI
In case of inter MME pool area mobility the new eNB, can easily discover
that the UE is coming from another pool area, the eNB is not a part of. In that
case the eNB runs the MME selection process that will choose the new MME
for the UE, which in turn allocates the new GUTI. The new GUTI (that
includes the new MMEs identity) is used from that moment to route
signalling messages from the UE to the selected MME, until the MME pool
area is changed.
LoadBalancing LoadBalancing LoadBalancing LoadBalancing
The MME Load Balancing functionality permits UEs that are entering into an
MME Pool Area to be directed to an appropriate MME in a manner that
achieves load balancing between MMEs. This is achieved by setting a Weight
Factor (WF) for each MME, such that the probability of the eNodeB selecting
an MME is proportional to its Weight Factor. The Weight Factor is typically
set according to the capacity of an MME node relative to other MME nodes.
5 Core Network

141
MME
MME
MME
eNB
W
F
=
1
0
WF=10
W
F
=
2
0

Figure 5-9 Load balancing
The MME Load Re-balancing functionality permits UEs that are registered on
an MME (within an MME Pool Area) to be moved to another MME.
An example use for the MME Load Re-balancing function is for the O&M
related removal of one MME from an MME Pool Area.
MME
MME
MME

Figure 5-10 Load re-balancing
The eNBs may have their Load Balancing parameters adjusted beforehand
(e.g. the Weight Factor is set to zero if all subscribers are to be removed from
the MME, which will route new entrant to the pool area into other MMEs).
The MME off-loads a cross section of its subscribers with minimal impacts on
the network and users (e.g. the MME avoids offloading only the low activity
users while retaining the high activity subscribers. Gradual rather than sudden
LTE/EPS Technology

142
off-loading is performed as a sudden re-balance of large number of
subscribers could overload other MMEs in the pool. With minimal impact on
network and the user's experience, the subscribers are off-loaded as soon as
possible). The load re-balancing can off-load part of or all the subscribers.
To off-load ECM-CONNECTED mode UEs for which there is no TA Update,
Attach, Detach or Service request procedure in progress, the inter eNodeB
handover with MME relocation procedure is used with the source eNodeB
being identical to the target eNodeB. The procedure is triggered by the MME
sending a Handover Trigger message to the eNodeB to move a particular UE.
To off-load UEs who perform TA Updates or Attaches, it is not decided jet
which mechanism is used to allow eNodeB to determine it has to transfer the
UE to a new MME. The following mechanisms have been proposed:
The MME receives the TA Update request or Attach request and
returns an indication in the accept message and releases the S1
connection. After receiving the indication, the UE will initiate a new
TAU procedure with a new MME reselection indication in RRC part.
The MME receives the TA Update or Attach request and retrns a
Redirection indication to the eNodeB. After receiving the indication,
the eNodeB forwards NAS message to a newly selected MME.
The MME informs the eNodeB to move all subsequent TAU Request
or Attach to a new MME node.
In all scenarios, the eNodeB will treat the UE as a new entrant to the pool area
and select another MME. The new MME will retrieve UE context from the
old MME.
To off-load UEs in ECM-IDLE state without waiting for the UE to perform a
TAU or perform Service request and become ECM-CONNECTED, the MME
first pages UE to bring it to ECM-CONNECTED state.
O OO Overload verload verload verloadcontrol control control control
The MME contains mechanisms for handling overload situations. These can
include the use of NAS signalling to reject NAS requests from UEs.
In addition, under unusual circumstances, the MME may need to restrict the
load that its eNodeBs are generating on it. This can be achieved by the MME
invoking the S1 interface overload procedure to a proportion of the eNB's
with which the MME has S1 interface connections. To reflect the amount of
load that the MME wishes to reduce, the MME can adjust the proportion of
eNodeBs which are sent S1 interface OVERLOAD START message, and the
content of the OVERLOAD START message.
5 Core Network

143
The MME selects the eNodeBs at random (so that if two MMEs within a pool
area are overloaded, they do not both send OVERLOAD START messages to
exactly the same set of eNodeBs).
Using the OVERLOAD START message, the MME can, for example, request
the eNodeB to:
reject all non-emergency Service Request messages for that MME;
and/or
reject all Service Request messages that are response to paging for that
MME; and/or
reject all new RRC connections for EPS Mobility Management
signalling (e.g. for TA Updates) for that MME; and/or
only permit RRC connection establishments for emergency sessions
for that MME.
When the MME has recovered and wishes to increase its load, the MME
sends OVERLOAD STOP messages to the eNodeB(s).
Hardware and/or software failures within an MME may reduce the MME's
load handling capability. Typically such failures should result in alarms which
alert the O&M system. Only if the O&M system is sure that there is spare
capacity in the rest of the pool, the O&M system might use the load re-
balancing procedure to move some load off this MME. However, extreme
care is needed to ensure that this load re-balancing does not overload other
MMEs within the pool area (or neighbouring SGSNs) as this might lead to a
much wider system failure.
SignallingTrans SignallingTrans SignallingTrans SignallingTransport(SIGTRAN) port(SIGTRAN) port(SIGTRAN) port(SIGTRAN)
Signalling Transport (SIGTRAN) is a new set of standards defined by the
International Engineering Task Force (IETF). This set of protocols has been
defined in order to provide the architectural model of signalling transport over
IP networks.
SCTP SCTP SCTP SCTP
To reliably transport SS7 messages over IP networks, the Internet Engineering
Task force SIGTRAN working group devised the Stream Control
Transmission Protocol (SCTP). SCTP allows the reliable transfer of signalling
messages between signalling endpoints in an IP network.
LTE/EPS Technology

144
Multihomi Multihomi Multihomi Multihoming ng ng ng
Opposed to TCP, an SCTP association can take advantage of a multihomed
host using all the IP addresses the host owns. This feature is one of the most
important ones in SCTP as it gives some network redundancy that is really
valuable when dealing with signalling. In the older signalling systems, like
SS7, every network component is duplicated, and the idea of loosing a TCP
connection due to the failure of one of the network cards was one of the major
problems that made SCTP necessary.
I
P
T
C
P
T
C
P

u
s
e
r
I
P
T
C
P
T
C
P

u
s
e
r
I
P
T
C
P
T
C
P

u
s
e
r
connection
endpoint/socket = IP address + TCP port number
IP path

Figure 5-11 Singlehomed protocol (TCP)
S
C
T
P
u
s
e
r
I
P
S
C
T
P
I
P
S
C
T
P
u
s
e
r
I
P
S
C
T
P
I
P
S
C
T
P
u
s
e
r
I
P
S
C
T
P
I
P
S
C
T
P
u
s
e
r
I
P
S
C
T
P
I
P
endpoint/socket = IP addresses + SCTP port number
IP paths
association

Figure 5-12 Multihomed protocol (SCTP)
Streams Streams Streams Streams
IP signalling traffic is usually composed of many independent message
sequences between many different signalling endpoints. SCTP allows
signalling messages to be independently ordered within multiple streams
(unidirectional logical channels established from one SCTP endpoint to
another) to ensure in-sequence delivery between associated endpoints. By
transferring independent message sequences in separate SCTP streams, it is
less likely that the retransmission of a lost message will affect the timely
delivery of other messages in unrelated sequences (problem called
5 Core Network

145
head-of-line blocking). Because TCP/IP does enforce head-of-line blocking,
the SCTP is better suited, rather than TCP/IP, for the transmission of
signalling messages over IP networks.
TCP connection
2 1
buffered
3 4 5
2
3
4
5
1 Re-Tx
application

Figure 5-13 Head-Of-Line (HOL) blocking single TCP connection
Stream
2
Stream
1
45
46
buffered
5
6 2
delivered delivered
1 2
5 6
45 46
SCTP
association
Stream 0
Stream 1
Stream 2
SCTP user
Stream
0

Figure 5-14 SCTP association with several streams
Messageorientedprotocol Messageorientedprotocol Messageorientedprotocol Messageorientedprotocol
TCP is stream oriented, and this can be also an inconvenience for some
applications, since usually they have to include their own marks inside the
stream so the beginning and end of their messages can be identified. In
addition, they should explicitly make use of the push facility to ensure that the
complete message has been transferred in a reasonable time.
TCP
user
TCP
TCP
TCP
user

Figure 5-15 Stream oriented protocol (TCP)
LTE/EPS Technology

146
Opposed to TCP, an SCTP is message oriented. This means that the SCTP is
aware of the upper layer protocol data structures, thus always a complete
messages, well separated from each other are deliver to the SCTP user on the
receiving side.
SCTP
user
SCTP
SCTP
SCTP
user

Figure 5-16 Message oriented protocol (SCTP)
Security Security Security Security
SCTP is using and new method for association establishment. It completely
removed the problem of the so-called SYN attack in TCP. This attack is very
simple and can affect any system connected to the Internet providing TCP-
based network services (such as an HTTP, FTP or mail server).
Let us see in short how this basic attack is performed. In TCP, the
establishment phase consists of a three-way handshake. These three packets
are usually called SYN (from Synchronization, as it has the SYN flag set,
used only during the establishment), SYN-ACK (it has both the SYN and
ACK flags set) and ACK (this is a simple acknowledgement message with the
ACK flag set).
SYN Ack No. = 0, Seq. No. = Tag A
SYN ACK Ack No. = Tag A, Seq. No. =Tag B
ACK Ack No. = Tag B, ...
Client Server
TCB

Figure 5-17 Establishment procedure (TCP)
5 Core Network

147
The problem is that the receiver of the SYN not only sends back the SYN-
ACK but also keeps some information about the packet received while
waiting for the ACK message (a server in this state is said to have a half-open
connection). The memory space used to keep the information of all pending
connections is of finite size and it can be exhausted by intentionally creating
too many half-open connections. This makes the attacked system unable to
accept any new incoming connections and thus provokes a denial of service to
other users wanting to connect to the server. There is a timer that removes the
half-open connections from memory when they have been in this state for so
long, and that will eventually make the system to recover, but nothing will
change if the attacker continues sending SYN messages.
SYN Fake IP address A
SYN Fake IP address B
SYN Fake IP address C
SYN Fake IP address ...
S
Y
N
A
C
K
S
Y
N
A
C
K
S
Y
N

A
C
K
S
Y
N

A
C
K

Figure 5-18 SYN attack in TCP
As we see, the attacker uses IP spoofing, making it unable to receive the
SYN-ACK segments produced, which is not a problem since it will never
answer them. All those SYN-ACK segments will be lost unless there is any
host with TCP service listening to the port and addresses used as the source of
the SYN segment. In that case that host will answer with a segment carrying
the RST (from Reset) flag set and the attacked system will delete the
information for that specific half-open connection.
SCTP gives no chance of success to this kind of attacks with its cookie
mechanism. When the designers of SCTP started to think about how to deal
with SYN flooding, they quickly saw that two things were necessary in order
not to make a new transport protocol with the same weakness:
The server (the initiate of a new association) should not use even a
byte of memory until the association is completely established.
There must be a way to recognise that the client (the initiator of the
association) is using its real IP address.
Usually, to meet the second requirement, the server sends some kind of key
number to the client who will only receive that information if the source
LTE/EPS Technology

148
address used in its IP datagram is the real one. Once the client has that
information, it can then send a confirmation to the server using that key
number thus proving that it was telling the truth. This means that the server
needs to save somewhere that key number as well so there is a way it can
verify that the key number was the right one. But then comes the problem of
being forced to store that value somewhere and using some memory resources
while waiting for the answer that might never come.
Therefore, the idea was: why not instead of storing that information in our
system we make it to stay all the time in the network or in the client's
memory? Of course, one immediately thinks that if a datagram coming from
the client is the one that is going to provide us the information to check
against the client's answer, we have not done anything but making worse the
situation. The client will tell us whatever it wants and then it could just
completely open an association sending us a simple message.
But this is not necessarily true if we manage to convert the two problems into
another one: the server has to sign with a secret key the information sent to
the client. So, when it receives that information back from the client, it can
recognise due to the signature and using the secret key, that it did send exactly
that information, which is unmodified, and so we can be as confident on it as
if it had never left the server's buffers.
INIT
INIT ACK (COOKIE)
COOKIE ECHO (COOKIE)
Client Server
COOKIE ACK
TCB
COOKIE
TCB

Figure 5-19 Cookie (SCTP association establishment)
5 Core Network

149
SIGTRANinGSM/UMTS SIGTRANinGSM/UMTS SIGTRANinGSM/UMTS SIGTRANinGSM/UMTS
Traditionally, on all the interfaces in GSM/UMTS CN, as well as, on
interfaces connecting CN with the RAN, the SS7 is used. However the
traditional SS7 protocols stack is not a good solution for the networks with IP
transport sine it still requires traditional TDM based interfaces to carry SS7
signalling links. That is way, majority of the GSM/UMTS operators are
replacing traditional SS7 protocol stack with SIGTRAN. However, since it is
just the modification of the traditionally SS7 protocol stack, only the MTP
and sometimes additionally SCCP protocols are replaced by SIGTRAN,
whereas the upper layers remains unchanged. This requires an extra set of
protocols called the SIGTRAN User Adaptation Layers (UALs) introducing
some extra cost, consuming processing power of the signalling nodes and
adding also some complexity to the system. In fact, SIGTRAN in the today
networks is only emulating the behaviour of the transport layers of the SS7.
IP
SCTP
MTP3
M2UA M2PA IUA V5UA
SCCP
TCAP
ISUP BSSAP MAP CAP Q.931 V5.2
SIGTRAN protocols
SS7 protocols
SIGTRAN protocols
SS7 protocols
M3UA SUA

Figure 5-20 SIGTRAN protocol suite
The User Adaptation Layers are named according to the service they replace,
rather than the user of that service. For example, M3UA adapts SCTP to
provide the services of MTP3, rather then providing a service to MTP3.
LTE/EPS Technology

150
SIGTRAN currently defines six adaptation layers, as follows:
V5.2 User Adaptation (V5UA) provides the services of the V.5.2
protocol.
ISDN User Adaptation (IUA) provides the services of the ISDN Data
Link layer (LAPD). Its user would be an ISDN layer 3 (Q.931) entity.
MTP2 User Adaptation (M2UA) provides the services of MTP2 in a
client-server situation, such as SG to MGC. Its user would be MTP3.
MTP2 Peer-to-Peer Adaptation (M2PA) provides the services of
MTP2 in a peer-to-peer situation, such as SG-to-SG connections. Its
user would be MTP3.
MTP3 User Adaptation (M3UA) provides the services of MTP3 in
both a client-server (SG to MGC) and peer-to-peer architecture. Its
users would be SCCP and/or ISUP.
SCCP User Adaptation (SUA) provides the services of SCCP in a
peer-to-peer architecture. Its user would be TCAP, or another
transaction-based application part.
SIGTRANinEPS SIGTRANinEPS SIGTRANinEPS SIGTRANinEPS
Since EPS is introducing a completely new set of the signalling protocols,
these protocols were designed to operate directly on top of SCTP, without
need for any User Adaptation Layers. Hence, the protocol stack is not only
more elegant, but also it is much more efficient. Instead of emulating the
behaviour of the traditional SS7 the, the SCTP can provide its services
directly to the top most protocols, so they are now ready to fully utilise
capabilities of the SCTP. Thanks to the fact, that there is less protocols in the
stack the new system behaves better in terms of both, transmission bandwidth
utilisation, as well as processing power consumption in the end devices.
IP
SCTP
S1AP X2AP SGsAP Diameter

Figure 5-21 SIGTRAN in EPS
5 Core Network

151
Userdatatransfer Userdatatransfer Userdatatransfer Userdatatransfer
The EPS nodes are interconnected via a private IP network of the operator,
thus when communicating between each other they are using IP addresses
from that private IP network.
The IP address allocated to the user is in fact belonging to the external PDN
addressing space, as it is used between the UE and the servers in the external
network.
eNB S-GW P-GW
IP private
IP IP IP IP
IP IP
IP address allocation
IP private or
public

Figure 5-22 Tunnelling
This means that on the interface which carries user data, user IP packets going
to and from PDN have to be send inside other IP packets going between EPS
nodes.
S-GW P-GW
IP IP IP IP IP IP IP

Figure 5-23 User IP packet encapsulation
There are two different methods how to handle this situation in EPS:
evolved GPRS Tunnelling Protocol (eGTP),
Proxy Mobile IP (PMIP).
LTE/EPS Technology

152
eGTP eGTP eGTP eGTP
Evolved GPRS Tunnelling Protocol (eGTP) is a third version of the well
know GTP protocol being used for the same purposes in GSM/UMTS
networks.
The difference between eGTP and GTP are mainly related to the addition of
new EPS specific parameters to the control messages. However the principles
of both eGTP (GTPv2) and GTPv2 are still the same.
Tunnels Tunnels Tunnels Tunnels
GTP tunnels are used between two nodes communicating over a GTP based
interface, to separate traffic into different communication flows.
GTP
UDP
IP
L2
L1
GTP
UDP
IP
L2
L1
GTPv2 entity GTPv2 entity
GTPv2 based
interface
GTP
UDP
IP
L2
L1
GTP
UDP
IP
L2
L1
GTPv2 entity GTPv2 entity
GTPv2 based
interface

Figure 5-24 GTPv2 protocol stack
A GTP tunnel is identified in each node with a Tunnel Endpoint Identifier
(TEID), an IP address and a UDP port number. The receiving end side of a
GTP tunnel locally assigns the TEID value the transmitting side has to use.
The TEID values are exchanged between tunnel endpoints using GTP-C, S1-
MME or X2-eNB messages.
5 Core Network

153
eNB S-GW P-GW
SGSN RNC
GTP-U GTP-U
MME
GTP-U
GTP-U
S1AP
RANAP
G
T
P
-
C
GTP-C
GTP-C

Figure 5-25 Tunnel control protocols
Tunnel Tunnel Tunnel Tunnelestablishment establishment establishment establishment
The generic tunnel establishment procedure is shown in Fig. 5-26.
Node 1
Data
Node 2
Create Tunnel Request ( )
Control
Create Tunnel Response ( )
TEID & IP @ Node 1 for data
TEID & IP @ Node 1 for signalling
TEID & IP @ Node 2 for data
TEID & IP @ Node 2 for signalling

Figure 5-26 Generic tunnel establishment procedure
The node that is initiating the tunnel establishment sends to the terminating
node the Create Tunnel Request message, the message among many other
procedure specific parameters includes:
LTE/EPS Technology

154
Tunnel Endpoint Identifier (TEID) for User Plane that specifies a
TEID for GTP-U which is chosen by originating node. The
terminating node includes this TEID in the GTP-U header of all
subsequent GTP-U packets, send in the backward direction.
Tunnel Endpoint Identifier (TEID) for Control Plane that specifies
a TEID for control plane messages which is chosen by the originating
node. The terminating node includes this TEID in the GTP-C header
of all GTP-C packets, send in the backward direction. Those packets
can carry messages used to complete the tunnel establishment, modify
the already existing tunnel or to release the existing tunnel,
Originating nodes IP address for User Plane,
Originating nodes IP address for Control Plane.
The terminating node answers with the Create Tunnel Response message
which contains:
Tunnel Endpoint Identifier for Data that specifies an uplink Tunnel
Endpoint Identifier for G-PDUs that is chosen by the GGSN. The
SGSN includes this Tunnel Endpoint Identifier in the GTP header of
all subsequent uplink G-PDUs which are related to the requested PDP
context.
Tunnel Endpoint Identifier Control Plane that specifies an uplink
Tunnel Endpoint Identifier for control plane messages, which is
chosen by the GGSN. The SGSN includes this Tunnel Endpoint
Identifier in the GTP header of all subsequent uplink-control plane
messages, which are related to the requested PDP context.
Terminating nodes IP address for User Plane,
Terminating nodes IP address for Control Plane.
From that moment the user communication context one side of the tunnel are
associated with the corresponding context on the other side of the tunnel. This
association is kept thanks to allocation of flow specific pairs of IP addresses
and TEIDs for both user data and control messages.
MIP MIP MIP MIP&PMIP &PMIP &PMIP &PMIP
Handling mobility in IP based networks remains a challenging task. Using IP
addresses for routing purposes as well as node identification leads to a
problem known as IP semantic overloading. Transport protocols use IP
addresses for identifying transport endpoints thus changing a nodes layer-3
Network Attachment Point (NAP) breaks already established transport
connections.
5 Core Network

155
Mobile IP (MIP) serves as the standard mobility mechanism for IP based
networks and tackles the semantic overloading problem by assigning a node
two addresses: one is used for routing purposes (Care-of-Address) and one for
node identification (Home-Address). However, other approaches have been
proposed: the Host Identity Protocol (HIP) introduces a new, separated
namespace of host identifiers (more precisely: IP stack identifiers) for
transport endpoint naming. This decoupling of the transport from the network
layer allows the latter to evolve independently. Making transport protocols
aware of IP address changes is an approach followed by the Stream Control
Transport Protocol (SCTP). Here, the transport protocol provides
functionality to handle multiple IP addresses and their changes concurrently.
MobileIP MobileIP MobileIP MobileIP
In IP networks, routing is based on stationary IP addresses, similar to how a
postal letter is delivered to the fixed address on the envelope. A device on a
network is reachable through normal IP routing by the IP address it is
assigned on the network.
The problem occurs when a device roams away from its home network and is
no longer reachable using normal IP routing. This results in the active
sessions of the device being terminated. Mobile IP was created to enable users
to keep the same IP address while travelling to a different network (which
may even be on a different wireless operator), thus ensuring that a roaming
individual could continue communication without sessions or connections
being dropped.
Because the mobility functions of Mobile IP are performed at the network
layer rather than the physical layer, the mobile device can span different types
of wireless and wire line networks while maintaining connections and
ongoing applications.
Mobile IP has the following three components, as shown in Fig. 5-27:
Mobile Node,
Home Agent,
Foreign Agent.
LTE/EPS Technology

156
Internet
Mobile node
at home
Mobile node visiting
foreign network
Home agent Foreign agent
Foreign agent
Foreign network
Foreign network
Home network

Figure 5-27 Mobile IP components
The Mobile Node is a device such as a cell phone, PDA, or laptop whose
software enables network roaming capabilities.
The Home Agent is a router on the home network serving as the anchor point
for communication with the Mobile Node; it tunnels packets from a device on
the Internet, called a Correspondent Node, to the roaming Mobile Node. (A
tunnel is established between the Home Agent and a reachable point for the
Mobile Node in the foreign network.)
The Foreign Agent is a router that may function as the point of attachment
for the Mobile Node when it roams to a foreign network, delivering packets
from the Home Agent to the Mobile Node.
The care-of address is the termination point of the tunnel toward the Mobile
Node when it is on a foreign network. The Home Agent maintains an
association between the home IP address of the Mobile Node and its care-of
address, which is the current location of the Mobile Node on the foreign or
visited network.
The Mobile IP process has three main phases, which are discussed in the
following sections:
Agent Discovery - A Mobile Node discovers its Foreign and Home
Agents during agent discovery.
Registration - The Mobile Node registers its current location with the
Foreign Agent and Home Agent during registration.
Tunnelling - A reciprocal tunnel is set up by the Home Agent to the
care-of address (current location of the Mobile Node on the foreign
network) to route packets to the Mobile Node as it roams.
5 Core Network

157
AgentDiscovery AgentDiscovery AgentDiscovery AgentDiscovery
During the agent discovery phase, the Home Agent and Foreign Agent
advertise their services on the network by using the ICMP Router Discovery
Protocol (IRDP). The Mobile Node listens to these advertisements to
determine if it is connected to its home network or foreign network.
The IRDP advertisements carry Mobile IP extensions that specify whether an
agent is a Home Agent, Foreign Agent, or both; its care-of address; the types
of services it will provide such as reverse tunnelling and Generic Routing
Encapsulation (GRE); and the allowed registration lifetime or roaming period
for visiting Mobile Nodes. Rather than waiting for agent advertisements, a
Mobile Node can send out an agent solicitation. This solicitation forces any
agents on the link to immediately send an agent advertisement.
If a Mobile Node determines that it is connected to a foreign network, it
acquires a care-of address. Two types of care-of addresses exist:
Care-of address acquired from a Foreign Agent,
Collocated care-of address.
A Foreign Agent care-of address is an IP address of a Foreign Agent that has
an interface on the foreign network being visited by a Mobile Node. A Mobile
Node that acquires this type of care-of address can share the address with
other Mobile Nodes. A collocated care-of address is an IP address temporarily
assigned to the interface of the Mobile Node itself. A collocated care-of
address represents the current position of the Mobile Node on the foreign
network and can be used by only one Mobile Node at a time.
When the Mobile Node hears a Foreign Agent advertisement and detects that
it has moved outside of its home network, it begins registration.
Reg Reg Reg Registration istration istration istration
The Mobile Node is configured with the IP address and mobility security
association (which includes the shared key) of its Home Agent. In addition,
the Mobile Node is configured with either its home IP address, or another user
identifier, such as a Network Access Identifier.
The Mobile Node uses this information along with the information that it
learns from the Foreign Agent advertisements to form a Mobile IP registration
request. It adds the registration request to its pending list and sends the
registration request to its Home Agent either through the Foreign Agent or
directly if it is using a collocated care-of address and is not required to
register through the Foreign Agent. If the registration request is sent through
the Foreign Agent, the Foreign Agent checks the validity of the registration
request, which includes checking that the requested lifetime does not exceed
its limitations, the requested tunnel encapsulation is available, and that reverse
LTE/EPS Technology

158
tunnel is supported. If the registration request is valid, the Foreign Agent adds
the visiting Mobile Node to its pending list before relaying the request to the
Home Agent. If the registration request is not valid, the Foreign Agent sends a
registration reply with appropriate error code to the Mobile Node.
The Home Agent checks the validity of the registration request, which
includes authentication of the Mobile Node. If the registration request is valid,
the Home Agent creates a mobility binding (an association of the Mobile
Node with its care-of address), a tunnel to the care-of address, and a routing
entry for forwarding packets to the home address through the tunnel.
The Home Agent then sends a registration reply to the Mobile Node through
the Foreign Agent (if the registration request was received via the Foreign
Agent) or directly to the Mobile Node. If the registration request is not valid,
the Home Agent rejects the request by sending a registration reply with an
appropriate error code.
The Foreign Agent checks the validity of the registration reply, including
ensuring that an associated registration request exists in its pending list. If the
registration reply is valid, the Foreign Agent adds the Mobile Node to its
visitor list, establishes a tunnel to the Home Agent, and creates a routing entry
for forwarding packets to the home address. It then relays the registration
reply to the Mobile Node.
Finally, the Mobile Node checks the validity of the registration reply, which
includes ensuring an associated request is in its pending list as well as proper
authentication of the Home Agent. If the registration reply is not valid, the
Mobile Node discards the reply. If a valid registration reply specifies that the
registration is accepted, the Mobile Node is confirmed that the mobility
agents are aware of its roaming. In the collocated care-of address case, it adds
a tunnel to the Home Agent. Subsequently, it sends all packets to the Foreign
Agent.
The Mobile Node reregisters before its registration lifetime expires. The
Home Agent and Foreign Agent update their mobility binding and visitor
entry, respectively, during reregistration. In the case where the registration is
denied, the Mobile Node makes the necessary adjustments and attempts to
register again. For example, if the registration is denied because of time
mismatch and the Home Agent sends back its time stamp for synchronization,
the Mobile Node adjusts the time stamp in future registration requests.
Thus, a successful Mobile IP registration sets up the routing mechanism for
transporting packets to and from the Mobile Node as it roams.
5 Core Network

159
Tunneling Tunneling Tunneling Tunneling
The Mobile Node sends packets using its home IP address, effectively
maintaining the appearance that it is always on its home network. Even while
the Mobile Node is roaming on foreign networks, its movements are
transparent to correspondent nodes.
Data packets addressed to the Mobile Node are routed to its home network,
where the Home Agent now intercepts and tunnels them to the care-of address
toward the Mobile Node. Tunnelling has two primary functions:
encapsulation of the data packet to reach the tunnel endpoint, and
decapsulation when the packet is delivered at that endpoint. The default
tunnel mode is IP Encapsulation within IP Encapsulation. Optionally, GRE
and minimal encapsulation within IP may be used.
Typically, the Mobile Node sends packets to the Foreign Agent, which routes
them to their final destination, the Correspondent Node, as shown in
Fig. 5-28.
Internet
Foreign agent
Care of address
Home
agent
Correspondent
node
Mobile node

Figure 5-28 Packet forwarding
However, this data path is topologically incorrect because it does not reflect
the true IP network source for the data - rather, it reflects the home network of
the Mobile Node. Because the packets show the home network as their source
inside a foreign network, an access control list on routers in the network
called ingress filtering drops the packets instead of forwarding them. A
feature called reverse tunnelling solves this problem by having the Foreign
Agent tunnel packets back to the Home Agent when it receives them from the
Mobile Node.
LTE/EPS Technology

160
Internet
Foreign agent
Care of address
Home
agent
Correspondent
node
Mobile node

Figure 5-29 Reverse tunnel
Tunnel MTU discovery is a mechanism for a tunnel encapsulator such as the
Home Agent to participate in path MTU discovery to avoid any packet
fragmentation in the routing path between a Correspondent Node and Mobile
Node. For packets destined to the Mobile Node, the Home Agent maintains
the MTU of the tunnel to the care-of address and informs the Correspondent
Node of the reduced packet size. This improves routing efficiency by
avoiding fragmentation and reassembly at the tunnel endpoints to ensure that
packets reach the Mobile Node.
PMIP PMIP PMIP PMIP
In Proxy MIP (PMIP) the MIP client is in the network and not in the MS.
Except this difference, PMIP is very similar concept to MIP.
3GPP has proposed the PMIP as an alternative to the GTP on S5/S8
interfaces.
eNB S-GW P-GW
SGSN RNC
GTP-U PMIP
GTP-U
GTP-U

Figure 5-30 PMIP based interfaces (option)
5 Core Network

161
QoS QoS QoS QoS
The Evolved Packet System provides IP connectivity between a UE and a
PLMN external packet data network. This is referred to as PDN Connectivity
Service. The PDN Connectivity Service supports the transport of one or more
Service Data Flows (SDFs).
EPSbearer EPSbearer EPSbearer EPSbearer
For E-UTRAN access to the EPC the PDN connectivity service is provided by
an EPS bearer in case of GTP-based S5/S8, and by an EPS bearer
concatenated with IP connectivity between Serving GW and PDN GW in case
of PMIP-based S5/S8.
An EPS bearer uniquely identifies an SDF aggregate between a UE and a
PDN GW in case of GTP-based S5/S8, and between UE and Serving GW in
case of PMIP-based S5/S8.
An EPS bearer is the level of granularity for bearer level QoS control in the
EPC/E-UTRAN. That is, SDFs mapped to the same EPS bearer receive the
same bearer level packet forwarding treatment (e.g. scheduling policy, queue
management policy, rate shaping policy, RLC configuration, etc.). Providing
different bearer level QoS to two SDFs thus requires that a separate EPS
bearer is established for each SDF.
eNB S-GW P-GW
PDN
EPS Bearer #1 (bearer QoS1)
EPS Bearer #2 (bearer QoS2)
Service Data Flow (PCC parameters)

Figure 5-31 EPS bearer
One EPS bearer is established when the UE connects to a PDN, and that
remains established throughout the lifetime of the PDN connection to provide
the UE with always-on IP connectivity to that PDN. That bearer is referred to
LTE/EPS Technology

162
as the default bearer. Any additional EPS bearer that is established to the
same PDN is referred to as a dedicated bearer.
eNB S-GW P-GW
PDN
Dedicated Bearer (additional bearer, GBR or non-GBR)
Default Bearer (created as a part of Attach proc., non-GBR)

Figure 5-32 Default & dedicated bearer
An UpLink Traffic Flow Template (UL TFT) is a set of uplink packet filters.
A DownLink Traffic Flow Template (DL TFT) is a set of downlink packet
filters. Every EPS bearer is associated with an UL TFT in the UE and a DL
TFT in the PCEF.
UE
eNB S-GW
P-GW
PDN
EPS Bearer #1
EPS Bearer #2
Filters Filters

Figure 5-33 Traffic Flow Template (TFT)
The initial bearer level QoS parameter values of the default bearer are
assigned by the network, based on subscription data (in case of E-UTRAN the
MME sets those initial values based on subscription data retrieved from HSS).
The PCEF may change those values based in interaction with the PCRF or
based on local configuration.
The decision to establish or modify a dedicated bearer can only be taken by
the EPC, and the bearer level QoS parameter values are always assigned by
the EPC. Therefore, the MME does not modify the bearer level QoS
parameter values received on the S11 reference point during establishment or
modification of a dedicated bearer. Instead, the MME only transparently
forwards those values to the E-UTRAN. Consequently, QoS negotiation
between the E-UTRAN and the EPC during dedicated bearer establishment /
5 Core Network

163
modification is not supported. The MME may, however, reject the
establishment or modification of a dedicated bearer (e.g. in case the bearer
level QoS parameter values sent by the PCEF over a GTP based S8 roaming
interface do not comply with a roaming agreement).
eNB S-GW P-GW
Bearer establishment direction
no QoS negotiation
PCRF
AF
Bearer establishment trigger

Figure 5-34 Bearer establishment direction
An EPS bearer is referred to as a GBR bearer if dedicated network resources
related to a Guaranteed Bit Rate (GBR) value that is associated with the EPS
bearer are permanently allocated (e.g. by an admission control function in the
eNodeB) at bearer establishment/modification. Otherwise, an EPS bearer is
referred to as a Non-GBR bearer.
A dedicated bearer can either be a GBR or a Non-GBR bearer. A default
bearer is a Non-GBR bearer.
An EPS bearer is realized by the following elements:
An UL TFT in the UE maps an SDF to an EPS bearer in the uplink
direction. Multiple SDFs can be multiplexed onto the same EPS bearer
by including multiple uplink packet filters in the UL TFT;
A DL TFT in the PDN GW maps an SDF to an EPS bearer in the
downlink direction. Multiple SDFs can be multiplexed onto the same
EPS bearer by including multiple downlink packet filters in the DL
TFT;
A radio bearer transports the packets of an EPS bearer between a UE
and an eNodeB. There is a one-to-one mapping between an EPS
bearer and a radio bearer;
An S1 bearer transports the packets of an EPS bearer between an
eNodeB and a Serving GW;
An S5/S8 bearer transports the packets of an EPS bearer between a
Serving GW and a PDN GW;
LTE/EPS Technology

164
A UE stores a mapping between an uplink packet filter and a radio to
create the mapping between an SDF and a radio bearer in the uplink;
A PDN GW stores a mapping between a downlink packet filter and an
S5/S8 bearer to create the mapping between an SDF and an S5/S8
bearer in the downlink;
An eNodeB stores a one-to-one mapping between a radio bearer and
an S1 to create the mapping between a radio bearer and an S1 bearer
in both the uplink and downlink;
A Serving GW stores a one-to-one mapping between an S1 bearer and
an S5/S8 bearer to create the mapping between an S1 bearer and an
S5/S8 bearer in both the uplink and downlink.
QoSparameters QoSparameters QoSparameters QoSparameters
The bearer level (i.e. per bearer or per bearer aggregate) QoS parameters are
QCI, ARP, GBR, MBR, and AMBR described in this section.
Each EPS bearer (GBR and Non-GBR) is associated with the following bearer
level QoS parameters:
QoS Class Identifier (QCI);
Allocation and Retention Priority (ARP).
A QCI is a scalar that is used as a reference to access node-specific
parameters that control bearer level packet forwarding treatment (e.g.
scheduling weights, admission thresholds, queue management thresholds, link
layer protocol configuration, etc.), and that have been pre-configured by the
operator owning the access node (e.g. eNB).
The primary purpose of ARP is to decide whether a bearer establishment /
modification request can be accepted or needs to be rejected in case of
resource limitations (typically available radio capacity in case of GBR
bearers). In addition, the ARP can be used (e.g. by the eNodeB) to decide
which bearer(s) to drop during exceptional resource limitations (e.g. at
handover). Once successfully established, a bearer's ARP has no any impact
on the bearer level packet forwarding treatment (e.g. scheduling and rate
control). Such packet forwarding treatment should be solely determined by
the other bearer level QoS parameters: QCI, GBR, MBR, and AMBR.
5 Core Network

165
Video telephony is one use case where it may be beneficial to use EPS bearers
with different ARP values for the same UE. In this use case an operator could
map voice to one bearer with a higher ARP, and video to another bearer with
a lower ARP. In a congestion situation (e.g. cell edge) the eNB can then drop
the video bearer without affecting the voice bearer. This would improve
service continuity.
Each GBR bearer is additionally associated with the following bearer level
QoS parameters:
Guaranteed Bit Rate (GBR);
Maximum Bit Rate (MBR).
The GBR denotes the bit rate that can be expected to be provided by a GBR
bearer. The MBR limits the bit rate that can be expected to be provided by a
GBR bearer (e.g. excess traffic may get discarded by a rate shaping function).
Each APN is associated with the per APN Aggregate Maximum Bit Rate
(APN-AMBR) IP-CAN session level QoS parameter. The APN-AMBR is a
subscription parameter stored per APN in the HSS. It limits the aggregate bit
rate that can be expected to be provided across all Non-GBR bearers and
across all PDN connections of the same APN (e.g. excess traffic may get
discarded by a rate shaping function). Each of those Non-GBR bearers could
potentially utilize the entire APN-AMBR, e.g. when the other Non-GBR
bearers do not carry any traffic. GBR bearers are outside the scope of APN-
AMBR. The P-GW enforces the APN-AMBR in downlink. Enforcement of
APN-AMBR in uplink is done in the UE and additionally in the P-GW.
Each UE is associated with the per UE Aggregate Maximum Bit Rate (UE-
AMBR) bearer level QoS parameter. The UE-AMBR is limited by a
subscription parameter stored in the HSS. The MME sets the used UE-AMBR
to the sum of the APN-AMBR of all active APNs up to the value of the
subscribed UE-AMBR. The UE-AMBR limits the aggregate bit rate that can
be expected to be provided across all Non-GBR bearers of a UE (e.g. excess
traffic may get discarded by a rate shaping function). Each of those Non-GBR
bearers could potentially utilize the entire UE-AMBR, e.g. when the other
Non-GBR bearers do not carry any traffic. GBR bearers are outside the scope
of UE-AMBR. The E-UTRAN enforces the UE-AMBR in uplink and
downlink.
The GBR and MBR denote bit rates of traffic per bearer while UE-
AMBR/APN-AMBR denote bit rates of traffic per group of bearers. Each of
those QoS parameters has an uplink and a downlink component. On S1_MME
the values of the GBR, MBR, and AMBR refer to the bit stream excluding the
GTP-u/IP header overhead of the tunnel on S1_U.
LTE/EPS Technology

166
One 'EPS subscribed QoS profile' is defined for each APN permitted for the
subscriber. It contains the bearer level QoS parameter values for that APN's
default bearer (QCI and ARP) and the APN-AMBR.
EPS bearer
GBR bearer non-GBR bearer
QCI
ARP
GBR
MBR
UE-AMBR
APN-AMBR

Figure 5-35 EPS bearer related QoS parameters
Mappingbetween Mappingbetween Mappingbetween MappingbetweenQ QQ QC CC CIandUMTSQoSparameters IandUMTSQoSparameters IandUMTSQoSparameters IandUMTSQoSparameters
A recommended mapping for QoS Class Identifier to/from UMTS QoS
parameters is shown in Fig. 5-36.
- - - background 9
- no 3 interactive 8
- no 2 interactive 7
- no 1 interactive 6
- yes 1 interactive 5
unknown - - streaming 4
speech - - streaming 3
unknown - - conversational 2
speech - - conversational 1
source statistics
descriptor
signalling
indication
THP traffic class
UMTS QoS parameters
QCI
- - - background 9
- no 3 interactive 8
- no 2 interactive 7
- no 1 interactive 6
- yes 1 interactive 5
unknown - - streaming 4
speech - - streaming 3
unknown - - conversational 2
speech - - conversational 1
source statistics
descriptor
signalling
indication
THP traffic class
UMTS QoS parameters
QCI

Figure 5-36 QCI to UMTS QoS parameters mapping

6 Policy control and charging
167
Chapter Chapter Chapter Chapter6 66 6
Policycontrolandcharging Policycontrolandcharging Policycontrolandcharging Policycontrolandcharging
Topic Topic Topic Topic Page Page Page Page
Introduction.................................................................................................... 169
Policy Control ................................................................................................ 174
Charging......................................................................................................... 174
LTE/EPS Technology

168

This page is intentionally left blank
6 Policy control and charging
169
Introduction Introduction Introduction Introduction
First of all this it is necessary to have a definition of the policy control.
According to IETF, the first standard body that has been working on policy
control for IP networks, the policy control is the application of rules to
determine resource access and usage.
Policy control is described in 3GPP specifications as being part of the Packet
Core network architecture. Actually, this feature interacts not only with
Packet Core nodes, but also with SIP servers belonging to the IMS, such as
the P-CSCF.
Policycontrol Policycontrol Policycontrol Policycontrolandcharging andcharging andcharging andcharginginthepast inthepast inthepast inthepast
In early UMTS implementation (including UMTS R5) policy control was
user/terminal driven. Depending on the requested service (Web browsing,
streaming, Push-to-Talk), the user terminal was requesting a Packet Data
Protocol (PDP) context with QoS attributes being set accordingly to the type
of the service.
GGSN
APN #1
APN #2
service #1
PDP context #1
PDP context #2
SGSN
HSS
service #2
GPRS Core
CDR CDR CDR CDR

Figure 6-1 Policy Control and Charging (UMTS R5-)
The requested Access Point Name (APN) and QoS parameters were
eventually checked by the SGSN based on user subscription limitation stored
in the HSS. Using a set of Charging Data Records (CDRs) defined by the
standard and generated by the network elements such as the SGSN and
GGSN, the operator had the possibility of charging the end subscriber either
on time, volume or on allocated QoS. However, it was not possible to apply
differentiated charging rules for a different service data flows which could
possibly be aggregated within a single PDP context, as the end-user has
LTE/EPS Technology

170
actually no constrains for opening a new PDP context for each new type of
application being used.
PolicycontrolandcharginginUMTSR6 PolicycontrolandcharginginUMTSR6 PolicycontrolandcharginginUMTSR6 PolicycontrolandcharginginUMTSR6
As IMS really began to emerge from the standard, and considering the future
of IP-based applications (including the upcoming VoIP), the 3GPP
community decided to define a new architecture for more flexible policy
control and charging mechanisms.
Thanks to R6 evolution, the network has the possibility to identify the
different Service Data Flows (SDFs) being aggregated within a single PDP
context. This gives the possibility to the network of controlling (meaning
allowing or blocking) each of the flows and charging the end-user having a
much better accuracy.
GGSN
APN #1
service #1
PDP context #1
SGSN
HSS
service #2
GPRS Core
CDR CDR
SDF #1
usage
SDF #2
usage

Figure 6-2 Policy Control and Charging (UMTS R6+)
Each of those elementary flows, also known as SDF, is defined as a 5-tuple
(source IP address, destination IP address, source port, destination port and a
protocol used above IP). This definition allows identifying each of the
information flows from the mass of IP packets sent and received by the
terminal, for example:
a web-browsing session towards server A,
another web-browsing session towards server B,
a streaming session from server C,
a SIP-signalling flow associated to an IMS service.
Fig. 6-3 illustrates the new network elements introduced in the UMTS R6 to
allow flow-based policy control and charging. For that purpose, two new
network elements have been introduced:
Policy Decision Function (PDF),
Charging Rules Function (CRF).
6 Policy control and charging
171
GGSN
CRF
PDF
P-CSCF
PCEF AF
Gi
Rx Gx
Gq Go
SDF (source IP, destination IP,
source port, destination port, PID)

Figure 6-3 Policy Control architecture (UMTS R6)
The PDF is the network entity where the policy decisions are made. As the
IMS session is being setup, SIP signalling containing media requirements are
exchanged between the terminal and the P-CSCF. At some time in the session
establishment process, the PDF receives those requirements from the P-CSCF
and makes decision based on network operator rules, such as:
allowing or rejecting the media request,
using new or existing PDP context for an incoming media request,
checking the allocation of new resources against the maximum
authorised.
The GGSN is in charge of enforcing policy decisions received from the PDF
over Go interface. The policy rules are either pushed by the PDF, e.g. as
new media are added to an existing session, or requested by the GGSN
itself, when the establishment of a new PDP context is requested by the
terminal. The policy enforcement process performed by the GGSN takes the
form of a gating process. Each packet received by the GGSN in the
downlink or uplink direction is classified (meaning associated with one of the
existing SDF) and checked against filters being defined by the PDF for the
corresponding SDF.
The CRFs role is to provide operator defined charging rules applicable to each
service data flow. The CRFs selects the relevant charging rules based on
information provided by the P-CSCF, such as Application Identifier, Type of
Stream, Application Data Rate, etc.
Charging rules are then provided by the CRF to the GGSN in the form of a
packet filter similar to the 5-tuple gate definition above. Using the charging
rules, the GGSN is able to count packets for each of the SDFs and generates
corresponding charging records.
The two new CRF and PDF network nodes interact with the GGSN and the
AF using specific interfaces named in the Fig. 6-3. As for many IMS related
LTE/EPS Technology

172
interfaces, Gx, Go, Gq and Rx interfaces make use of already existing IETF
protocols.
Go is based on Common Open Policy Service (COPS) protocol. The COPS
protocol proposes generic policy control for packet networks and is based on
a simple client/server model. In the OPS terminology, two entities are
defined:
The Policy Decision Point (PDP), which is the policy server making
the decision in the UMTS case, this role is supported by the PDF.
The Policy Enforcement Point (PEP), which is the policy client,
responsible for enforcing the policy decisions in the UMTS case,
this role is supported by the GGSN.
The other policy control and charging interfaces (Gq, Gx and Rx) are all
based on an extended version of the IETF Diameter protocol, similarly to the
Cx interface already existing in IMS.
PolicycontrolandcharginginUMTSR7 PolicycontrolandcharginginUMTSR7 PolicycontrolandcharginginUMTSR7 PolicycontrolandcharginginUMTSR7
The major improvement brought by the R7 in terms of policy control and
charging is a definition of a new converged architecture, so as to allow the
optimisation of the interactions between these two functions. The R7
evolution involves a new network node PCRF (policy and Charging Rules
Function) which is actually a concatenation of a PDF and CRF. As a result,
evolved version of the R6 interfaces have been defined, as illustrated in
Fig. 6-4.
GGSN
PCRF
P-CSCF
PCEF AF
Gi
Rx Gx
SDF (source IP, destination IP,
source port, destination port, PID)

Figure 6-4 Policy Control and Charging (UMTS R7)
This model is actually not specific to UMTS or UTRAN access networks, as
it was defined for all types of IP access, including 3GPP access types and also
WLAN and fixed IP broadband access. In the generic policy and charging
control 3GPP model, the Policy and Charging Enforcement Function (PCEF)
is the generic name for the functional entity which supports service data flow
detection, policy enforcement and flow based charging. In the case of the
6 Policy control and charging
173
WLAN 3GPP IP Access, the PCEF is implemented by the Packet Data
Gateway (PDG).
Similarly , the Application Function (AF) represents the network element
which supports applications that require dynamic policy and/or charging
control. In the IMS model the AF is implemented by the P-CSCF.
The new R7 Rx interface combines both the former Rx and Gq. Since both
were based earlier on IETF Diameter protocol, the P-CSCF can provide
service dynamic information to the PCRF using a single procedure.
The new R7 Gx interface supports Gx and Go capabilities, so that policy
decision and charging rules are provided from the PCRF to the GGSN using a
single message. As R6 Gx and Go are not based on the same protocols (Gx is
based on Diameter whereas Go relies on COPS), the choice was made to use
Gx (Diameter) as a basis and to enhance it with all necessary features to allow
service based local policy.
Fig. 6-5 shows additionally two other interfaces: Gy and Gz.
GGSN
PCRF
P-CSCF
PCEF
AF
Gi
Rx
Gx
OCS OFCS
Gz Gy

Figure 6-5 Gy and Gz interfaces
The Gy interface resides between the Online Charging System (OCS) and the
PCEF. It allows online credit control for service data flow based charging.
The functionalities required across the Gy reference point use existing
functionalities and mechanisms, based on IETF Diameter Credit-Control
Application (RFC 4006).
The Gz interface resides between the PCEF and the Offline Charging System
(OFCS). It enables transport of service data flow based offline charging
information. The Gz interface is based on Ga interface specifications.
LTE/EPS Technology

174
PolicyControl PolicyControl PolicyControl PolicyControl
The model for policy control and charging in EPS networks is aligned with
the UMTS R7:
the new S7 interface introduced in EPC is based on Gx interface,
(described earlier),
the P-GW plays the role of the PCEF, as an equivalent of the GGSN
for the policy and charging control functions.
PCRF
P-CSCF
AF
SGi
Rx+
Gx
OCS OFCS
Gz Gy
P-GW
PCEF

Figure 6-6 EPS Policy Control and Charging architecture
Charging Charging Charging Charging
From the network operator point of view charging is one of the most critical
features. Network subscriber charging is not only the major source of revenue,
but also an area in which an operator can innovate and differentiate from its
competitors by creating cost attractive services and solutions while not
jeopardising the whole network profitability.
In legacy 2G or 3G CS based networks, charging was quite an easy task. Any
granted user service request involved the allocation of the fixed amount of
resource for a given time. Because CS technology means guaranteed
bandwidth and delay, the charging rules are generally simply based on the
allocated resource size and use time.
When using packet applications and packet transmission, the picture is a bit
different. The end-user may be inactive for long periods of time, e.g. during
silent phase of a PoC session or during the time needed to read a Web page
freshly downloaded, and during those inactivity phases, the resources may be
used for another purpose, which is one of the main benefits of the PS
6 Policy control and charging
175
networks. Therefore, it may be seen as quite unfair to only charge end-user for
connection time or service duration.
The standard does not specify the charging schemes, leaving to the operator
the choice to charge the end user based on any of the following:
data volume,
session or connection time,
service type (Web, e-mail, MMS, etc.),
allocated QoS.
For that purpose, the 3GPP standard proposes all the necessary features to
allow a flexible charging scheme to be implemented by operators. The
charging process is based on the collection of various events and information
which are stored in a formatted record called the Charging Data Record
(CDR).
Rf Rf Rf Rf Rf
P-CSCF EPC S-CSCF I-CSCF AS
Ga
SGSN
Ga
BD Bx CGF
CDF

Figure 6-7 EPS charging architecture
Fig. 6-7 presents the network element involved in the charging process and
their interaction with 2G, 3G and IMS network nodes. The role of the
Charging Data Function (CDF) is to collect charging information from the
different nodes through the Rf interface and built a corresponding CDR. The
type of the nodes being linked to the CDF is not limited. It includes IMS
nodes (such as the CSCF servers), Application Servers (like the BM-SC or
PoC server) and EPC nodes (however it not decided yet, which nodes are
going to be equipped with charging functionality).
LTE/EPS Technology

176
The Rf interface is based on the IETF Diameter protocol, also used in many
IMS interfaces. The Rf declination of Diameter makes use of extensions
specific to the charging process. The Charging Gateway Function (CGF) is a
gateway between the CN nodes and the Billing Domain (BD). Its main task is
CDR collection through the Ga interface, CDR storage, CDR management
(like CDR opening, closing, deleting) and secure transfer to the BD. The
default CDR transfer method over the Bx interface proposed by the 3GPP
standard is FTP. The Ga interface is based on a simple UDP/IP tunnelling
protocol whose only purpose is to transfer the CDRs.
For a given session, charging information is issued by different network
nodes. This information is used by the CDF or CGF to built a complete CDR,
putting together the various pieces from the network elements. The redundant
information (such as data traffic volumes or session start and stop timestamp)
is used to check the consistency between the views reported by the network
elements.
7 Traffic cases
177
Chapter Chapter Chapter Chapter7 77 7
Trafficcases Trafficcases Trafficcases Trafficcases
Topic Topic Topic Topic Page Page Page Page
EMM and ECM and RRC states.................................................................... 179
Attach procedure............................................................................................ 183
Tracking Area Update.................................................................................... 188
UE triggered Service Request ........................................................................ 191
Network Triggered Service Req. ................................................................... 192
Dedicated bearer activation............................................................................ 195
UE req. bearer resource alloc......................................................................... 196
Handover........................................................................................................ 197
Handover from E-UTRAN to 3G .................................................................. 203
Idle state Signalling Reduction ...................................................................... 205
LTE/EPS Technology

178

This page is intentionally left blank
7 Traffic cases
179
EMMandECM EMMandECM EMMandECM EMMandECMandRRC andRRC andRRC andRRCstates states states states
EPSMobilityManagementstates EPSMobilityManagementstates EPSMobilityManagementstates EPSMobilityManagementstates
The EPS Mobility Management (EMM) states describe the Mobility
Management states that result from the mobility management procedures e.g.
Attach and Tracking Area Update procedures.
EMM-REGISTERED EMM-DEREGISTERED
Attach accept,
TAU accept
Detach,
Attach reject,
TAU reject,
non-3GPP handover,
all bearers deactivated

Figure 7-1 EPS Mobility Management (EMM) states
EMM EMM EMM EMM- -- -DERGISTERED DERGISTERED DERGISTERED DERGISTERED
In the EMM-DEREGISTERED state, the EMM context in MME holds no
valid location or routeing information for the UE. The UE is not reachable by
a MME, as the UE location is not known.
EMM EMM EMM EMM- -- -REGISTERED REGISTERED REGISTERED REGISTERED
The UE enters the EMM-REGISTERED state by a successful registration
procedure which is either an Attach procedure or a Tracking Area Update
procedure. In the EMM-REGISTERED state, the UE can receive services that
require registration in the EPS.
The UE location is known in the MME to at least an accuracy of the tracking
area list allocated to that UE.
In the EMM-REGISTERED state, the UE shall always have at least one
active PDN connection and setup the EPS security context.
LTE/EPS Technology

180
If all the bearers belonging to a UE are released (e.g., after handover from
EUTRAN to non-3GPP access), the MME shall change the MM state of the
UE to EMM-DEREGISTERED. If the UE detects that all of its bearers are
released, the UE shall change the MM state to EMM-DEREGISTERED. If
the UE switches off its EUTRAN interface when performing handover to non-
3GPP access, the UE shall automatically change its MM state to EMM-
DEREGISTERED.
The MME may perform an implicit detach any time after the UE reachable
timer expires.
EPSConnectionManagemen EPSConnectionManagemen EPSConnectionManagemen EPSConnectionManagementstates tstates tstates tstates
The EPS Connection Management (ECM) states describe the signalling
connectivity between the UE and the EPC.
S1 connection
established
S1 connection
released
RRC connection
established
MME:
UE:
ECM-IDLE ECM-CONNECTED
RRC connection
released
ECM-IDLE ECM-CONNECTED

Figure 7-2 EPS Connection Management (ECM) states
ECM ECM ECM ECM- -- -IDLE IDLE IDLE IDLE
A UE is in ECM-IDLE state when no NAS signalling connection between UE
and network exists. In ECM-IDLE state, a UE performs cell
selection/reselection according and PLMN selection.
There exists no UE context in E-UTRAN for the UE in the ECM-IDLE state.
There is no S1_MME and no S1_U connection for the UE in the ECM-IDLE
state.
7 Traffic cases
181
In the EMM-REGISTERED and ECM-IDLE state, the UE shall:
perform a tracking area update if the current TA is not in the list of
TAs that the UE has received from the network in order to maintain
the registration and enable the MME to page the UE,
perform the periodic tracking area updating procedure to notify the
EPC that the UE is available,
answer to paging from the MME by performing a service request
procedure,
perform the service request procedure in order to establish the radio
bearers when uplink user data is to be sent.
The UE and the MME shall enter the ECM-CONNECTED state when the
signalling connection is established between the UE and the MME. Initial
NAS messages that initiate a transition from ECM-IDLE to ECM-
CONNECTED state are Attach Request, Tracking Area Update Request,
Service Request or Detach Request.
The UE in the ECM-IDLE state performs the tracking area update procedure
when TAI in the EMM system information is not in the list of TA's that the
UE is registered with the network.
When the UE is in ECM-IDLE state, the UE and the network may be
unsynchronized, i.e. the UE and the network may have different sets of
established EPS bearers. When the UE and the MME enter the ECM-
CONNECTED state, the set of EPS Bearers is synchronized between the UE
and network.
ECM ECM ECM ECM- -- -CONNECTED CONNECTED CONNECTED CONNECTED
The UE location is known in the MME with an accuracy of a serving eNodeB
ID. The mobility of UE is handled by the handover procedure.
The UE performs the tracking area update procedure only when explicitly
triggered by the eNodeB. The eNodeB shall trigger the tracking area update
procedure after a handover with the change of MME, which may happen due
to UE mobility or due to load rebalancing. It is up to RAN configuration
whether the eNodeB triggers the tracking area update procedure after
handover without MME change on condition that the current TAI is not in the
list of TA's that the UE has registered with the network.
For a UE in the ECM-CONNECTED state, there exists a signalling
connection between the UE and the MME. The signalling connection is made
up of two parts: an RRC connection and an S1_MME connection.
LTE/EPS Technology

182
The S1 release procedure changes the state at both UE and MME from ECM-
CONNECTED to ECM-IDLE.
After a signalling procedure, the MME may decide to release the signalling
connection to the UE, after which the state at both the UE and the MME is
changed to ECM-IDLE.
When a UE changes to ECM-CONNECTED state and if a radio bearer cannot
be established, the corresponding EPS bearer is deactivated.
RRSstates RRSstates RRSstates RRSstates
A UE is in RRC_CONNECTED when an RRC connection has been
established. If this is not the case, i.e. no RRC connection is established, the
UE is in RRC_IDLE state. The RRC states can further be characterised as
follows:
RRC_IDLE: RRC_IDLE: RRC_IDLE: RRC_IDLE:
A UE specific DRX may be configured by upper layers.
UE controlled mobility;
The UE:
o Monitors a Paging channel to detect incoming calls;
o Performs neighbouring cell measurements and cell
(re)selection;
o Acquires system information.
RRC_CONNECTED: RRC_CONNECTED: RRC_CONNECTED: RRC_CONNECTED:
Transfer of unicast data to/from UE.
At lower layers, the UE may be configured with a UE specific DRX/
DTX.
Network controlled mobility, i.e. handover and cell change order with
network assistance (NACC) to GERAN;
The UE:
o Monitors control channels associated with the shared data
channel to determine if data is scheduled for it;
o Provides channel quality and feedback information;
7 Traffic cases
183
o Performs neighbouring cell measurements and measurement
reporting;
o Acquires system information.
The following figure not only provides an overview of the RRC states in E-
UTRA, but also illustrates the mobility support between E-UTRAN, UTRAN
and GERAN.

Handover
CELL_PCH
URA_PCH
CELL_DCH
UTRA_Idle
E-UTRA
RRC_CONNECTED
E-UTRA
RRC_IDLE
GSM_Idle/GPRS
Packet_Idle
GPRS Packet
transfer mode
GSM_Connected
Handover

Reselection Reselection
Reselection
Connection
establishment/release
Connection
establishment/release
Connection
establishment/release
CCO,
Reselection
CCO with
NACC
CELL_FACH
CCO, Reselection

Figure 7-3 Radio Resource Control (RRC) states
Attachprocedure Attachprocedure Attachprocedure Attachprocedure
A UE needs to register with the network to receive services that require
registration. This registration is described as Network Attachment. The
always-on IP connectivity for UE of the EPS is enabled by establishing a
default EPS bearer during Network Attachment. The Policy and Charging
Control (PCC) rules applied to the default EPS bearer may be predefined in
the PDN GW and activated in the attachment by the PDN GW itself (more
about PCC in Chapter 6). The Attach procedure may trigger one or multiple
Dedicated Bearer Establishment procedures to establish dedicated EPS bearer
or bearers for that UE. During the attach procedure, the UE may request for
an IP address allocation.
During the Initial Attach procedure the IMEI may be obtained from the UE.
The MME operator may check the IMEI with an EIR. At least in roaming
situations, the MME passes the IMEI to the HSS, and, if a PDN-GW outside
of the VPLMN, MME passes the IMEI also to the PDN-GW.
LTE/EPS Technology

184
5. Identity Request/Response
First Downlink Data
17. RRC Con. Rec.
Complete
(Attach Complete)
16. RRC Con.
Reconfiguration
(Attach Accept)
2. Attach Request
11. Create Default Bearer Req.
13. Create Default Bearer Rsp.
5. ME Identity Check
6. Update Location
EIR
1. Attach Request
3. Identification
4. Authentication/Security
7. Cancel Loc.
8. Insert Subscriber Data
9. Update Location Ack.
10. Create Default Bearer Request
12. PCRF
Interaction
14. Create Default Bearer Rsp.
15. Attach Accept
18. Attach Cmp.
First Uplink Data
19. Update Bearer Request
20. Update Bearer Response
First Downlink Data
21. Update Location Request
22. Update Location Response
old MME/SGSN HSS S-GW P-GW PCRF new MME

Figure 7-4 Attach procedure
1. The UE initiates the Attach procedure by the transmission of an Attach
Request message containing:
(old GUTI or IMSI if no GUTI is available),
last visited TAI (if available),
UE network capabilities (e.g. NAS and AS security algorithms),
PDN address allocation (indicates whether the UE wants to perform
the IP address allocation during the attach procedure),
Protocol Configuration Options (PCO are used to transfer parameters
between the UE and the PDN GW, and are sent transparently through
the MME and the Serving GW e.g. user name and password to access
external network),
attach type (may indicate handover when the UE is coming from
non-3GPP access, where it has an opened connection session),
information about valid security parameters,
selected network (PLMN that is selected for network sharing
purposes).
2. The eNB derives the MME from the GUTI and from the indicated selected
network. If that MME is not associated with the eNB, the eNB selects a new
MME. The eNB forwards the Attach Request message to the new MME
contained in a S1-MME control message (Initial UE message) together with
the selected network and an indication of the E-UTRAN area identity, a
7 Traffic cases
185
globally unique E-UTRAN ID of the cell from where it received the message
to the new MME.
3. If the UE identifies itself with GUTI and the MME has changed since
detach, the new MME sends an Identification Request (containing old
GUTI, complete Attach Request message) to the old MME to request the
IMSI. If the S-TMSI and old TAI identifies an SGSN, the message shall be
sent to the old SGSN. The old MME/SGSN responds with Identification
Response (IMSI, Authentication Quintets and NAS security context).
4. If no UE context for the UE exists anywhere in the network and UE is
either not using integrity protection or if the check of integrity failed, then
authentication and NAS security setup are mandatory. Otherwise it is
optional.
5. The IMEI is retrieved from the UE. The procedure is optional in case, when
attach type indicates handover. The MME may send the IMEI Check
Request (IMEI, IMSI) to the EIR. The EIR responds with IMEI Check Ack
(Result). Dependent upon the Result, the MME decides whether to continue
with this Attach procedure or to reject the UE.
6. If the MME has changed since the last detach, or if there is no valid
subscription context for the UE in the MME, or if the IMEI has changed, the
MME sends an Update Location (MME Identity, IMSI, IMEI) to the HSS.
7. The HSS sends Cancel Location (IMSI, cancellation type = update
procedure) to the old MME. The old MME acknowledges with Cancel
Location Ack (IMSI) and removes the MM and bearer contexts.
8. The HSS sends Insert Subscriber Data (IMSI, Subscription Data)
message to the new MME. The Subscription Data contains the list of all
APNs that the UE is permitted to access, an indication about which of those
APNs is the Default APN, and the EPS subscribed QoS profile for each
permitted APN.
Then the new MME constructs a context for the UE and returns an Insert
Subscriber Data Ack. message to the HSS. The Default APN is used for the
remainder of this procedure.
9. The HSS acknowledges the Update Location message by sending an
Update Location Ack. to the new MME.
10. If the PDN subscription context contains no PDN GW address the new
MME selects a PDN GW. The new MME also selects a Serving GW and
allocates an EPS Bearer Identity for the Default Bearer associated with the
UE. Then it sends a Create Default Bearer Request (IMSI, MSISDN, MME
Context ID, PDN GW address, APN, RAT type, Default Bearer QoS, PDN
Address Allocation, EPS Bearer Identity, Protocol Configuration Options,
LTE/EPS Technology

186
IMEI, ECGI, Serving Network) message to the selected S-GW. The RAT type
is provided in this message for the later PCC decision.
11. The Serving GW creates a new entry in its EPS Bearer table and sends a
Create Default Bearer Request (IMSI, MSISDN, APN, Serving GW
Address for the user plane, Serving GW TEID of the user plane, Serving GW
TEID of the control plane, RAT type, Default Bearer QoS, PDN Address
Allocation, EPS Bearer Identity, Protocol Configuration Options, ME
Identity, ECGI, Serving Network) message to the PDN GW indicated by the
PDN GW address received in the previous step. After this step, the Serving
GW buffers any downlink packets it may receive from the PDN GW until
receives the message in step 20 below.
12. If dynamic PCC is deployed, the PDN GW interacts with the PCRF to get
the default PCC rules for the UE. This may lead to the establishment of a
number of dedicated bearers in association with the establishment of the
default bearer.
The IMSI, UE IP address, ECGI, Serving Network, RAT type, Default Bearer
QoS are provided to the PCRF by the PDN GW if received by the previous
message. The ECGI is used for location based charging.
13. The PDN GW returns a Create Default Bearer Response (PDN GW
Address for the user plane, PDN GW TEID of the user plane, PDN GW TEID
of the control plane, PDN Address Information, EPS Bearer Identity, UL
TFT) message to the Serving GW. PDN Address Information (IP address) is
included if the PDN GW allocated a PDN address Based on PDN Address
Allocation received in the Create Default Bearer Request.
14. The Serving GW returns a Create Default Bearer Response (PDN
Address Information, Serving GW address for User Plane, Serving GW TEID
for User Plane, Serving GW Context ID, EPS Bearer Identity, PDN GW
addresses and TEIDs at the PDN GW(s) for uplink traffic, UL TFT) message
to the new MME. PDN Address Information is included if it was provided by
the PDN GW.
15. The new MME sends an Attach Accept (APN, GUTI, PDN Address
Information, TAI List, EPS Bearer Identity, Session Management
Configuration) message to the eNodeB. GUTI is included if the new MME
allocates a new GUTI. This message is contained in an S1_MME control
message Initial Context Setup Request. This S1 control message also includes
the AS security context information for the UE, the Handover Restriction List,
the bearer level QoS parameters, EPS Bearer Identity and the AMBR
associated with the PDN Address Information, and QoS information needed
to set up the radio bearer, as well as the TEID at the Serving GW used for
user plane and the address of the Serving GW for user plane. The PDN
address information, if assigned by the PDN GW, is included in this message.
7 Traffic cases
187
If the UE has UTRAN or GERAN capabilities, the MME uses the EPS bearer
QoS information to derive the corresponding PDP context parameters QoS
Negotiated (R99 QoS profile), Radio Priority and Packet Flow Id and includes
them in the Session Management Configuration. The UL TFT shall be
included in the Session Management Configuration.
16. The eNodeB sends the RRC Connection Reconfiguration message
including the EPS Radio Bearer Identity to the UE, and the Attach Accept
message will be sent along to the UE. The UE shall store the QoS Negotiated,
Radio Priority, Packet Flow Id, which it received in the Session Management
Configuration, for use when accessing via GERAN or UTRAN. The APN is
provided to the UE to notify it of the APN for which the activated default
bearer is associated. The UE uses the uplink packet filter (UL TFT) to
determine the mapping of uplink packets to the radio bearer.
17. The UE sends the RRC Connection Reconfiguration Complete message
to the eNodeB. This message includes the Attach Complete message. With
the Attach Complete message the UE starts using the NAS security algorithm
indicated by the MME.
18. The eNodeB forwards the Attach Complete message to the new MME in
an S1 control message. This S1 control message includes the TEID of the
eNodeB and the address of the eNodeB used for downlink traffic on the S1_U
reference point.
After the Attach Accept message and once the UE has obtained a PDN
Address Information, the UE can then send uplink packets towards the
eNodeB which will then be tunnelled to the Serving GW and PDN GW.
19. The new MME sends an Update Bearer Request (eNodeB address,
eNodeB TEID) message to the Serving GW.
20. The Serving GW acknowledges by sending Update Bearer Response (EPS
Bearer Identity) message to the new MME. The Serving GW can then send its
buffered downlink packets.
21. After the MME receives Update Bearer Response (EPS Bearer Identity)
message, if an EPS bearer was established and the subscription data indicates
that the user is allowed to perform handover to non-3GPP accesses, and if the
MME selected a PDN GW that is different from the PDN GW address which
was indicated by the HSS in the PDN subscription context, the MME shall
send an Update Location Request including the APN and PDN GW address to
the HSS for mobility with non-3GPP accesses.
22. The HSS stores the APN and PDN GW address pair and sends an Update
Location Response to the MME.
LTE/EPS Technology

188
TrackingAreaUpdate TrackingAreaUpdate TrackingAreaUpdate TrackingAreaUpdate
TAU TAU TAU TAUprocedurewithMMEandS procedurewithMMEandS procedurewithMMEandS procedurewithMMEandS- -- -GWchange GWchange GWchange GWchange
14. Cancel Location Ack.
19. TAU Complete
3. TAU Request
2. TAU Request
7. Context Ack.
6. Authentication
4. Context Req.
13. Cancel Location
old MME/SGSN HSS new S-GW P-GW new MME old S-GW
1. UE changes
to a new TA
5. Context Res.
8. Create Bearer Request
9. Update Bearer Request
10. Update Bearer Response
11. Create Bearer Response
12. Update Location
15. Insert Subscriber Data
15. Insert Subscriber Data Ack.
16. Update Location Ack.
17. Delete Bearer Request
18. Delete Bearer Response
19. TAU Accept

Figure 7-5 TAU procedure with MME and S-GW change
1. The UE detects a change to a new TA by discovering that its current TAI is
not in the list of TAIs that the UE registered with the network.
2. The UE initiates the TAU procedure by sending a TAU Request
containing:
old GUTI,
last visited TAI- included in order to help the MME produce a good
list of TAIs for any subsequent TAU Accept message,
active flag - requests to activate the radio and S1 bearers for all the
active EPS Bearers by the TAU procedure when the UE is in ECM-
IDLE state,
EPS bearer status - indicates each EPS bearer that is active in the UE,
Selected Network,
Security parameters.
7 Traffic cases
189
3. The eNodeB derives the MME from the GUTI and from the indicated
Selected Network. If that MME is not associated with that eNodeB, the
eNodeB selects a new MME.
The eNodeB forwards the TAU Request message together with an indication
of the E-UTRAN Area Identity, a globally unique E-UTRAN ID, of the cell
from where it received the message and with the Selected Network to the new
MME.
4. The new MME sends a Context Request (old GUTI, complete TAU
Request message) message to the old MME to retrieve user information. The
new MME derives the old MME from the GUTI.
5. The old MME responds with a Context Response message containing:
IMSI,
MSISDN,
Authentication Quintets,
bearer contexts (e.g. PDN GW Address and TEID(s) for uplink
traffic),
Serving GW signalling Address and TEID(s).
If the UE is not known in the old MME or if the integrity check for the TAU
Request message fails, the old MME responds with an appropriate error
cause. The MSISDN is included if the old MME has it stored for that UE.
6. If the integrity check of TAU Request message (sent in step 2) failed, then
authentication is mandatory.
7. The new MME determines whether to relocate the Serving GW or not. The
Serving GW is relocated when the old Serving GW cannot continue to serve
the UE. The new MME may also decide to relocate the Serving GW in case a
new Serving GW is expected to serve the UE longer and/or with a more
optimal UE to PDN GW path, or in case a new Serving GW can be co-located
with the PDN GW.
The new MME sends a Context Acknowledge (Serving GW change
indication) message to the old MME. Serving GW change indication indicates
a new Serving GW has been selected. The old MME marks in its context that
the information in the GWs and the HSS are invalid. This ensures that the old
MME updates the GWs and the HSS if the UE initiates a TAU procedure
back to the old MME before completing the ongoing TAU procedure.
8. The MME constructs an MM context for the UE. The MME verifies the
EPS bearer status received from the UE with the bearer contexts received
from the old MME and releases any network resources related to EPS bearers
that are not active in the UE. If the new MME selected a new Serving GW it
LTE/EPS Technology

190
sends a Create Bearer Request (IMSI, bearer contexts, MME Context ID)
message to the selected new Serving GW. The PDN GW address is indicated
in the bearer Contexts.
9. The new Serving GW sends the message Update Bearer Request (Serving
GW Address, Serving GW TEID) to the PDN GW concerned.
10. The PDN GW updates its bearer contexts and returns an Update Bearer
Response (MSISDN, PDN GW address and TEID(s)) message.
11. The Serving GW updates its bearer context. This allows the Serving GW
to route bearer PDUs to the PDN GW when received from eNodeB.
The Serving GW returns a Create Bearer Response (MME Context ID,
Serving GW address and TEID for user plane, Serving GW Context ID)
message to the new MME.
12. The new MME sends an Update Location (MME Identity, IMSI) message
to the HSS.
13. The HSS sends the message Cancel Location (IMSI, Cancellation Type)
to the old MME with Cancellation Type set to Update Procedure.
14. The old MME removes the MM context and acknowledges with the
message Cancel Location Ack (IMSI).
15. The HSS sends Insert Subscriber Data (IMSI, Subscription Data) to the
new MME.
The new MME constructs an MM context for the UE and returns an Insert
Subscriber Data Ack (IMSI) message to the HSS.
16. The HSS acknowledges the Update Location message by sending an
Update Location Ack to the new MME.
17. When the old MME removes the MM context and it receives the Serving
GW change indication in the Context Acknowledge message, the old MME
deletes the EPS bearer resources by sending Delete Bearer Request (Cause,
TEID) messages to the Serving GW. Cause indicates to the old Serving GW
that the old Serving GW shall not initiate a delete procedure towards the PDN
GW. If the Serving GW has not changed, the old MME does not delete the
bearers. If the MME has not changed, step 11 triggers the release of EPS
bearer resources when a new Serving GW is allocated.
18. The Serving GW acknowledges with Delete Bearer Response (TEID)
messages.
19. The new MME validates the UEs presence in the (new) TA, after it has
received valid and updated subscription data. If all checks are successful then
the MME sends a TAU Accept (new GUTI, TAI list, EPS bearer status,
security parameters) message to the UE. If the active flag is set in the TAU
7 Traffic cases
191
Request message the user plane setup procedure can be activated in
conjunction with the TAU Accept message (same message sequence as for
UE triggered Service Request procedure describer later in this chapter). The
UE removes any internal resources related to bearers that are not marked
active in the received EPS bearer status.
20. If new GUTI or new security parameters were included in the TAU
Accept, the UE acknowledges the received message by returning a TAU
Complete message to the MME.
UEtriggeredServ UEtriggeredServ UEtriggeredServ UEtriggeredServiceRequest iceRequest iceRequest iceRequest
11. Update Bearer Rsp.
9. Update Bearer Req.
1. NAS Service Req.
3. Authentication
HSS
S-GW P-GW MME
4. S1-AP: Initial
Context Setup Req.
5. Radio Bearer
Establishment
12. Update Bearer Rsp.
6. Uplink data
8. Update Bearer Req.
PCRF
2. NAS Service Req.
7. S1-AP Initial
Context Setup Cmp.
10. PCEF Initiated
IP-CAN Session
Modification

Figure 7-6 UE triggered Service Request
1. The UE sends NAS message Service Request (S-TMSI) towards the MME
encapsulated in an RRC message (e.g. Initial UE message) to the eNodeB.
2. The eNodeB forwards NAS message to MME. NAS message is
encapsulated in an S1-AP: Initial UE Message (NAS message, CGI of the
serving cell).
3. NAS authentication procedures may be performed.
4. The MME sends S1-AP Initial Context Setup Request (Serving GW
address, S1-TEID(s) UL, Bearer QoS(s), Security Context, MME Signalling
Connection Id) message to the eNodeB. This step activates the radio and S1
bearers for all the active EPS Bearers. The eNodeB stores the Security
Context, MME Signalling Connection Id, Bearer QoS profile(s) and S1-
TEID(s) in the UE RAN context.
5. The eNodeB performs the radio bearer establishment procedure. The user
plane security is established at this step, which implicitly confirms the Service
Request. When user plane security has been established the EPS bearer state
LTE/EPS Technology

192
is synchronized between the UE and the network, i.e. the UE should remove
the EPS bearer for which no radio bearers are setup.
6. The uplink data from the UE can now be forwarded by eNodeB to the
Serving GW. The eNodeB sends the uplink data to the Serving GW address
and TEID provided in the step 4.
7. The eNodeB sends an S1-AP message Initial Context Setup Complete
(eNodeB address, List of accepted EPS bearers, List of rejected EPS bearers,
S1 TEID(s) DL) to the MME.
8. The MME sends an Update Bearer Request message (eNodeB address, S1
TEID(s) for the accepted EPS bearers, RAT Type) to the Serving GW. The
Serving GW is now able to transmit downlink data towards the UE.
9. If the RAT Type has changed compared to the last reported RAT Type, the
Serving GW shall send the Update Bearer Request message (RAT Type) to
the PDN GW.
10. If dynamic PCC is deployed, the PDN GW interacts with the PCRF to get
the PCC rule(s) according to the RAT Type. If dynamic PCC is not deployed,
the PDN GW may apply local QoS policy.
11. The PDN GW sends the Update Bearer Response to the Serving GW.
12. The Serving GW sends an Update Bearer Response to the MME.
NetworkTriggeredServiceReq. NetworkTriggeredServiceReq. NetworkTriggeredServiceReq. NetworkTriggeredServiceReq.
Downlink Data Notification Ack.
S-GW P-GW MME RNC/BSC SGSN
eNodeB
Downlink data
Downlink Data Notification
Downlink Data Notification Ack.
Downlink Data Notification
Paging
Paging
Paging
Paging
UE Paging Response/UE triggered Service Request procedure
Downlink data E-UTRAN
Downlink data GERAN or UTRAN non Direct Tunnel
Downlink data UTRAN Direct Tunnel

Figure 7-7 Network Triggered Service Request
7 Traffic cases
193
When the Serving GW receives a downlink data packet for a UE known as
not user plane connected (i.e. the S-GW context data indicates no downlink
user plane TEID), it buffers the downlink data packet. and identifies which
MME or SGSN is serving that UE.
The Serving GW sends a Downlink Data Notification message to the MME
and SGSN nodes for which it has control plane connectivity for the given
UE
1
. The MME and SGSN respond to the S-GW with a Downlink Data
Notification Ack. message.
If the UE is registered in the MME, the MME sends a Paging message
(NAS Paging ID, TAI(s), Paging DRX ID) to each eNodeB belonging to the
Tracking Area(s) in which the UE is registered.
If the UE is registered in the SGSN, the SGSN sends paging messages to
RNC/BSS.
If eNodeBs receive paging messages from the MME, the UE is paged by
the eNodeBs.
If RNC/BSS nodes receive paging messages from the SGSN the UE is paged
by the RNSC/BSS.
Upon reception of paging indication in E-UTRAN access, the UE initiates
the UE triggered Service Request procedure.
Upon reception of paging indication in UTRAN or GERAN access, the MS
responds in respective access and the SGSN notifies the S-GW.
The MME and/or SGSN supervises the paging procedure with a timer. If the
MME and/or SGSN receives no response from the UE to the Paging Request
message, it may repeat the paging. The repetition strategy is operator
dependent.
The Serving GW transmits downlink data towards the UE only via the
RAT where paging response was received.
S1releaseprocedure S1releaseprocedure S1releaseprocedure S1releaseprocedure
This procedure is used to release the logical S1-AP signalling connection
(over S1-MME) and all S1 bearers (in S1-U) for a UE. The procedure will
move the UE from ECM-CONNECTED to ECM-IDLE in both the UE and
MME, and all UE related context information is deleted in the eNodeB.

1
In case the network is not supporting ISR or ISR is not activated for that UE, the S-GW has control plane
connectivity for the given UE with only one node i.e. SGSN or MME exclusively.
LTE/EPS Technology

194
The initiation of S1 Release procedure is either:
eNodeB-initiated with cause e.g. user inactivity, O&M intervention,
unspecified failure, user inactivity, UE generated signalling
connection release, repeated RRC signalling integrity check failure,
etc.,
MME-initiated with cause e.g. authentication failure, detach, etc.
Both eNodeB-initiated and MME-initiated S1 release procedures are shown in
Fig. 7-8.
2. Update Bearer Request
S-GW MME
1. S1-AP: S1 UE Context
Release Request
3. Update Bearer Response 4. S1-AP: S1 UE Context
Release Command
5. RRC Connection Release
6. S1-AP: S1 UE Context
Release Complete

Figure 7-8 S1 release procedure
1. If the eNodeB detects a need to release the UE's signalling connection and
all radio bearers for the UE, the eNodeB sends an S1 UE Context Release
Request (cause) message to the MME.
Step 1 is only performed when the eNodeB-initiated S1 release procedure is
considered. Step 1 is not performed and the procedure starts with Step 2 when
the MME-initiated S1 release procedure is considered.
2. The MME sends an Update Bearer Request message to the S-GW that
requests the release of all S1-U bearers for the UE. This message is triggered
either by an S1 Release Request message from the eNodeB, or by another
MME event.
3. The S-GW releases all eNodeB related information (address and TEIDs)
for the UE and responds with an Update Bearer Response message to the
MME. Other elements of the UE's S-GW context are not affected. The S-GW
retains the S1-U configuration that the S-GW allocated for the UEs bearers.
The S-GW starts buffering downlink packets received for the UE and
initiating the Network Triggered Service Request procedure, described
earlier, if downlink packets arrive for the UE.
4. The MME releases S1 by sending the S1 UE Context Release Command
(cause) message to the eNodeB.
7 Traffic cases
195
5. If the RRC connection is not already released, the eNodeB sends a RRC
Connection Release message to the UE. Once the message is acknowledged
by the UE, the eNodeB deletes the UEs context.
6. The eNodeB confirms the S1 Release by returning an S1 UE Context
Release Complete message to the MME. With this, the signalling connection
between the MME and the eNodeB for that UE is released.
The MME deletes any eNodeB related information (address and TEIDs) from
the UEs MME context, but, retains the rest of the UE's MME context
including the S-GW's S1-U configuration information (address and TEIDs).
All EPS bearers established for the UE are preserved in the MME and in the
Serving GW.
Dedicatedbeareractivat Dedicatedbeareractivat Dedicatedbeareractivat Dedicatedbeareractivation ion ion ion
The dedicated bearer activation procedure is depicted in Fig. 7-9.
S-GW P-GW PCRF MME
1. PCRF Initiated
IP-CAN Session
Modification, begin
2. Create Dedicated
Bearer Request
3. Create Dedicated
Bearer Request
4. Bearer Setup
Request
5. RRC Connection
Reconfiguration
6. RRC Connection
Reconfiguration Cmp.
7. Bearer Setup
Response
8. Create Dedicated
Bearer Response
9. Create Dedicated
Bearer Response
10. PCRF Initiated
IP-CAN Session
Modification, end

Figure 7-9 Dedicated Bearer Activation procedure
1. If dynamic PCC is deployed, the PCRF sends a PCC decision provision
(QoS policy) message to the PDN GW. If dynamic PCC is not deployed, the
PDN GW may apply local QoS policy.
2. The PDN GW uses this QoS policy to assign the EPS Bearer QoS. The
PDN GW sends a Create Dedicated Bearer Request message (IMSI, EPS
Bearer QoS, S5/S8-TEID) to the Serving GW.
3. The Serving GW sends the Create Dedicated Bearer Request (IMSI, EPS
Bearer QoS, S1-TEID) message to the MME. If the UE is in ECM-IDLE state
the MME will trigger the Network Triggered Service Request.
4. The MME then signals the Bearer Setup Request (EPS Bearer QoS, S1-
TEID) message to the eNodeB.
LTE/EPS Technology

196
5. The eNodeB maps the EPS Bearer QoS to the Radio Bearer QoS. It then
signals a RRC Connection Reconfiguration message to the UE.
6. The UE then acknowledges the radio bearer activation to the eNodeB with
a RRC Connection Reconfiguration Complete message.
7. The eNodeB acknowledges the bearer activation to the MME with a Bearer
Setup Response (EPS Bearer Identity, S1-TEID) message.
8. The MME acknowledges the bearer activation to the Serving GW by
sending a Create Dedicated Bearer Response (EPS Bearer Identity, S1-TEID)
message.
9. The Serving GW acknowledges the bearer activation to the PDN GW by
sending a Create Dedicated Bearer Response (EPS Bearer Identity, S5/S8-
TEID) message.
10.If the dedicated bearer activation procedure was triggered by a PCC
Decision Provision message from the PCRF, the PDN GW indicates to the
PCRF whether the requested PCC decision (QoS policy) could be enforced or
not.
UEreq UEreq UEreq UEreq.b .b .b .bearerresource earerresource earerresource earerresource al al al alloc. loc. loc. loc.
The UE requested bearer resource allocation procedure for an E-UTRAN is
depicted in Fig. 7-10. The procedure allows the UE to request for an
allocation of bearer resources to one new Service Data Flow with a specific
QoS demand. If accepted by the network, the request invokes the Dedicated
Bearer Activation Procedure. The procedure is used by the UE when the UE
already has an IP-CAN session with the PDN.
S-GW P-GW PCRF MME
1. Request Bearer Resource Allocation
2. Request Bearer
Resource Allocation
3. Request Bearer
Resource Allocation
4. PCEF Initiated
IP-CAN Session
Modification
5. Dedicated bearer activation procedure

Figure 7-10 UE requested bearer resource activation
7 Traffic cases
197
Handover Handover Handover Handover
This section aims at presenting how EPS networks support mobility cases for
ECM-CONNECTED terminals. As opposed to ECM-IDLE mode, ECM-
CONNECTED terminal mobility, called handover, is completely under
control of the network. The decision to move as well as the choice for the
target cell and technology (when applicable) is made by the current serving
eNodeB, based on measurements performed by the eNodeB itself and the
terminal. In addition, ECM-CONNECTED mode mobility requires some
specific features to be supported and implemented by the network so as to
limit interaction on user experience and preserve the ongoing service.
The E-UTRAN handover cases follow (as much as possible) two main
principles inherited from GSM and UMTS systems:
make before break In all the cases, the resources and context in the
target nodes (whatever the target technology is) are reserved before
the actual handover is performed in order to minimise the interruption
time is kept to a minimum.
packet data forwarding Due to the broadband nature of the E-
UTRAN radio interface, the amount of packets stored in radio
equipment before scheduled transmission over the radio may not be
negligible. For that reason, some mobility cases make use of packet
forwarding mechanism between source and target nodes so as to limit
packet loss during the overall handover.
IntraE IntraE IntraE IntraE- -- -UTRANhandoverwithX2support UTRANhandoverwithX2support UTRANhandoverwithX2support UTRANhandoverwithX2support
Fig. 7-11 shows the general architecture of an intra E-UTRAN handover case.
In this example, the whole procedure benefits from the availability of the X2
interface between the source and target eNodeB, so that the involvement of
the MME and S-GW in the handover process itself is at a minimum. In
addition, the X2 interface allows packet loss limitation thanks to buffered
packet forwarding from source to target eNodeB.
LTE/EPS Technology

198
X2
S-GW
P-GW
MME
SGi
S5
S1

Figure 7-11 Intra E-UTRAN handover with X2 support (overview)
The only impact on EPC nodes relates to the update of the signalling and user
plane connectivity. As the terminal is moving from one node to the other, the
new eNB needs to built an S1 connection with the MME which is in charge of
the user session, and also needs to built a new tunnel for user data
transmission with S-GW. Once the handover is completed, the old resources
and connections on the radio and S1 interface (represented using dotted lines)
are released. In any case, the handover is completely transparent to the P-GW,
which keeps tunnelling user data to and from the same S-GW.
Fig. 7-12 describes in more detail the different steps and signalling messages
which are part of the handover procedure.
HO Request
HO Request Ack
(HO cmd)
Update Bearer Request
Path Switch Request
Ack
S-GW P-GW MME
Path Switch Request
data forwarding
HO Command
HO Confirm
source target
HO decision
Radio Resource allocation
Update Bearer Response
Release Resource
Radio Resource release

Figure 7-12 Intra E-UTRAN handover with X2 support (message flow)
The handover decision is made by the source eNB, based on measurement
reported by the terminal and also possibly made by the eNB itself.
7 Traffic cases
199
Once the decision is made, the source eNB sends a Handover Request
message over the X2 interface to the target eNB, which allocates all needed
resources to accept the incoming UE and associated bearers. The target eNB
answers with Handover Request Ack. Message which encapsulates the
Handover Command content eventually sent to the terminal by the source
eNB. On reception of the Handover Request Ack., the source eNB forwards
all buffered downlink data packets that have not been acknowledged by the
terminal to the target eNB. Those packets will be stored by the target eNB
until the terminal is able to receive them.
Once the terminal is synchronised with the target eNB, it sends a Handover
Confirm message, which triggers the transmission of the Path Switch
procedure to the MME. Once the Handover Confirm is received, the target
eNB can transmit over the radio the buffered packets for the downlink. The
role of the Path Switch Request message is to inform the MME about the
successful completion of an intra E-UTRAN handover performed via the X2
interface and request a path switch of the user plane data towards the new
eNB. On reception of this message, the MME is now aware that the terminal
has successfully changed eNB and can therefore update the S-GW about the
new data path (the Update Bearer Request/Response). The Release Resource
is sent by the target eNB over X2 interface, which has the effect of releasing
old resources allocated in the source eNB.
IntraE IntraE IntraE IntraE- -- -UTRANhandoverwithoutX2 UTRANhandoverwithoutX2 UTRANhandoverwithoutX2 UTRANhandoverwithoutX2
In some cases, it may happen that the X2 interface is not available between
eNBs. This may result from network equipment failure, or simply from the
fact that the operator is not willing to deploy X2 connectivity between eNB
for cost reasons.
S-GW
P-GW
MME
SGi
S5
S1

Figure 7-13 Intra E-UTRAN handover without X2 support (overview)
LTE/EPS Technology

200
In such a case, the network architecture picture is the same as the previous
case. However, the overall handover process is much more complex, as there
is no direct communication between source and target eNB. As a
consequence, the MME is no longer transparent to the handover process, as it
acts as a signalling relay between the two eNBs.
HO Request Ack
(HO cmd)
S-GW P-GW MME
HO Notify
HO Request
HO Command
HO Required
HO Confirm
User Plane Update Req.
source target
HO decision
Radio Resource allocation
UE Context Release Command
Radio Resource release
HO Command
User Plane Update Rsp.
UE Context Release Complete

Figure 7-14 Intra E-UTRAN handover without X2 support (message flow)
Instead of being sent directly to the target eNB, the request for handover is
transmitted from the source eNB via the MME, using the Handover Required
and Handover Request S1 messages. Similarly, once the resources have been
allocated in the target eNB, the answer is sent back to the source eNB using
Handover Request Ack. And Handover Command S1 messages. This answer
message contains information related to the target cell radio resource.
Finally, once the handover is completed, the resources in the source eNB are
released under the MME control, once the MME receives the Handover
Notify message informing that the handover procedure is successful from the
E-UTRAN perspective. In parallel, the S-GW is updated about the new data
path towards the new eNB.
The main difference from the X2 support case is that no data-forwarding is
performed between the source and target eNBs. As a consequence, all the data
packets being buffered at the source eNB level will be lost. The impact on
user perception will depend on the application and corresponding protocol
stack being used.
For all non real-time applications (like Web browsing) which rely on secured
end-to-end transport layers like TCP, such a handover may induce a delay in
end-to-end information transmission, but no actual loss of data due to
retransmission mechanism implemented at the TCP level.
7 Traffic cases
201
However for real-time applications based on unsecured transport layers like
UDP (for example, streaming or voice), the handover will result in a loss of
data frames, with a possible impact on user quality of experience.
IntraE IntraE IntraE IntraE- -- -UTRANhandoverwithEPCnode UTRANhandoverwithEPCnode UTRANhandoverwithEPCnode UTRANhandoverwithEPCnode
relocation relocation relocation relocation
In this handover case, the target eNB has no connectivity with the current
MME and S-GW. For that reason, the terminal mobility will also imply a
relocation of EPC nodes. From the terminal and eNB perspective, this
handover is not different from the previous no X2 support case. The only
real difference relies on the fact that the session needs also to be handed over
from one MME to the other. In practice, it is performed by transferring the
user communication context from the source MME to the target MME using
the S10 interface. In addition, the P-GW needs also to be updated, so as to
maintain user plane connectivity.
If there is X2 connectivity between the source and target eNB, packet
forwarding can be applied so as to limit packet loss during the handover.
X2
MME
P-GW
S-GW
SGi
S5
S-GW MME
S1
S11 S11 S10

Figure 7-15 Intra E-UTRAN handover with EPC relocation (overview)
Depending on the network engineering choice, there might be other simpler
case of mobility with EPC node relocation. As S-GW and MME are separate
nodes, it may happen that a user mobility case implies a change of MME with
no change of S-GW.
Similarly, the source and target eNBs may be connected to the same MME,
but different S-GW.
LTE/EPS Technology

202
HO Request
S-GW P-GW MME
HO Notify
Forward Relocation Request
HO Request Ack.
(HO Cmd)
HO Required Create Bearer
Request
Update Bearer Request
target
HO decision
Radio Resource allocation
HO Confirm
Radio Resource release
HO Command
UE Context
Release Cmd.
S-GW MME
source
Create Bearer
Response
Forward Relocation Response (HO Cmd)
Forward Relocation Complete
Forward Relocation Complete Ack.
Update Bearer Response
UE Context
Release Cmp.
Delete Bearer
Request
Delete Bearer
Response

Figure 7-16 Intra E-UTRAN handover with EPC relocation (message flow)
Although looking more complex than the previous example (no X2 support),
this handover case uses the same principles. The main difference is in the fact
that the source and target MME are different nodes, which requires the
transfer of the user context (containing the user IMSI, user subscription
information, authentication vectors as well as on-going allocated EPS bearers)
between the two MMEs using the Forward Relocation Request/Response
messages. In addition, a new user plane bearer is created between the P-GW
(which is the user plane anchor point for the session) and the new S-GW.
Once the handover is complete from the access network perspective, the new
MME informs the old one about the successful outcome using the Forward
Relocation Complete message, so that the old radio resources and bearer path
can be released. In addition, the bearer path is updated using the Update
Bearer procedure, so that the P-GW can transmit the downlink packet to the
relevant new S-GW.
At the end, if the terminal determines that the new cell belongs to a TA it is
not registered to, a TA update procedure is performed towards the new MME.
As a consequence, the HSS is updated accordingly.
7 Traffic cases
203
Handover Handover Handover HandoverfromE fromE fromE fromE- -- -UTRANto3G UTRANto3G UTRANto3G UTRANto3G
EPS networks are to support seamless mobility to and from 2G and 3G packet
systems. Fig. 7-17 describes an examples of such a mobility case, for a
terminal moving from a E-UTRAN access towards a UTRAN target cell.
For simplicity, the target RNC and NBs nodes are represented as one box.
In the case of handover towards a 2G/GPRS system, the picture would
actually be quite similar, as the SGSN node exists in both 2G and 3G packet
core architecture.
S-GW
P-GW
MME
SGi
S5
Iu
SGSN
S4
S3
S1
RNC+NB

Figure 7-17 Handover from E-UTRAN to 3G (overview)
As represented in the figure above, the S-GW acts as a sort of user plane
anchor point. The control plane for NAS signalling (for session setup and
control) is moved over the S3 interface from the serving MME to the target
SGSN, which is the standard point of terminating this protocol in 2G and 3G
packet architecture. Regarding the user plane, a new tunnel is built between
the S-GW and the target SGSN over the S4 interface so as to ensure packet
transmission continuity.
Since the S-GW still remains in the data path, the P-GW is not directly
involved in the procedure, However, it is informed about the change in radio
access technology, mainly for charging purposes.
Once the handover is completed, the old resources and connections on the
radio as well as S1 user and signalling interfaces are released.
LTE/EPS Technology

204
Handover to UTRAN Complete
MME
HO Required
Update Bearer Request
HO decision
Radio Resource allocation
Radio Resource release
HO Command
P-GW S-GW
source
Forward Relocation
Reqest
UE Context
Release Cmd.
SGSN RNC+NB
Relocation Req.
Relocation Rsp.
Forward Relocation
Response
HO Command
Relocation Cmp.
Forward Relocation
Complete
Forward Relocation
Complete Ack.
Upd. Bearer Req.
Upd. Bearer Rsp.
Update Bearer Response
UE Context
Release Cmp.

Figure 7-18 Handover from E-UTRAN to 3G (message flow)
When the handover decision is made, the session context (including session-
related EPS bearers and associated QoS attributes) is moved from the source
MME to the target SGSN using Forward Relocation procedure, as in the Intra
E-UTRAN with EPC nodes relocation handover case. This procedure is
actually an extension of the existing Forward Relocation procedure which
applies in the case of inter-SGSN mobility within 2G and 3G networks.
On this occasion, the MME translates the EPS QoS attributes into their 2G or
3G equivalent, in the form of PDP context attributes.
E-UTRAN to 2G/3G handover may support data forwarding, from the eNB to
the target SGSN so as to avoid that all packets still stored at the eNB may
eventually be sent to the terminal. Data forwarding is always requested by the
eNB (and reflected by the content of the Handover Required message). The
3GPP standard proposes two types of data forwarding:
Direct forwarding in which buffered data are sent directly from the
eNB to the target SGSN. All necessary information (such as IP
address and Tunnel Identifier) is part of the Forward Relocation
Response message.
Indirect forwarding in which buffered data are transmitted to the
target SGSN via a S-GW.
The Handover Command message contains all information for the eNB to be
able to forward buffered data, either in direct or indirect mode.
Once the terminal is synchronised on the target NB and the handover
considered as completed from the access network point of view, a Forward
Relocation Complete is sent from the SGSN to the MME. The signal is used
as an indication that resources in the old serving E-UTRAN and MME nodes
are no longer useful and can be released. Simultaneously, the target SGSN
updates the bearer path towards the S-GW using the Update Bearer procedure.
7 Traffic cases
205
IdlestateSignallingReduction IdlestateSignallingReduction IdlestateSignallingReduction IdlestateSignallingReduction
Idle state Signalling Reduction (ISR) aims at reducing the frequency of
Tracking Area Update (TAU) and Routing Area Update (RAU) procedures
caused by UEs reselecting between E-UTRAN and GERAN/UTRAN which
are operated together. Especially the update signalling between UE and
network is reduced. But also network internal signalling is reduced.
UMTS described already RAs containing GERAN and UTRAN cells, which
also reduces update signalling between UE and network. The combination of
GERAN and UTRAN into the same RAs implies however common scaling,
dimensioning and configuration for GERAN and UTRAN (e.g. same RA
coverage, same SGSN service area, no GERAN or UTRAN only access
control, same physical node for GERAN and UTRAN). As an advantage it
does not require special network interface functionality for the purpose of
update signalling reduction.
ISR enables signalling reduction with separate SGSN and MME and also with
independent Tracking Ares (TAs) and Routing Areas (RAs). Thereby the
interdependency is drastically minimized compared with the
GERAN/UTRAN RAs. This comes however with ISR specific node and
interface functionality. SGSN and MME may be implemented together, which
reduces some interface functions but results also in some dependencies.
ISR support is mandatory for E-UTRAN UEs that support GERAN and/or
UTRAN and optional for the network. ISR requires special functionality in
both the UE and the network (i.e. in the SGSN, MME, S-GW and HSS) to
activate ISR for a UE. The network can decide for ISR activation individually
for each UE. Gn/Gp SGSNs
2
do not support ISR functionality.
It is inherent functionality of the MM procedures to enable ISR activation
only when the UE is able to register via E-UTRAN and via GERAN/UTRAN.
For example, when there is no E-UTRAN coverage there will be also no ISR
activation. Once ISR is activated it remains active until one of the criteria for
deactivation in the UE occurs, or until SGSN or MME indicate during an
update procedure no more the activated ISR, i.e. the ISR status of the UE has
to be refreshed with every update.
When ISR is activated this means the UE is registered with both MME and
SGSN. Both the SGSN and the MME have a control connection with the
S-GW. MME and SGSN are both registered at HSS. The UE stores MM
parameters from SGSN (e.g. P-TMSI and RA) and from MME (e.g. GUTI

2
Gn/Gp SGSN is an SGSN connected to the MME via GTPv1 based, Gn/Gp like interface. In contrast, regular
SGSN is a SGSN connected to the MME via GTPv2 based, S3 interface, that supports all EPS specific procedures.
LTE/EPS Technology

206
and TA(s)) and the UE stores session management (bearer) contexts that are
common for E-UTRAN and GERAN/UTRAN accesses. In idle state the UE
can reselect between E-UTRAN and GERAN/UTRAN (within the registered
RA and TAs) without any need to perform TAU or RAU procedures with the
network. SGSN and MME store each other's address when ISR is activated.
When ISR is activated and downlink data arrive, the S-GW initiates paging
processes on both SGSN and MME. In response to paging or for uplink data
transfer the UE performs normal Service Request procedures on the currently
camped-on RAT without any preceding update signalling (there are however
existing scenarios that may require to perform a RAU procedure prior to the
Service Request when GERAN/UTRAN RAs are used together).
The UE and the network run independent periodic update timers for
GERAN/UTRAN and for E-UTRAN. When the MME or SGSN do not
receive periodic updates MME and SGSN may decide independently for
implicit detach, which removes session management (bearer) contexts from
the CN node performing the implicit detach and it removes also the related
control connection from the S-GW. Implicit detach by one CN node (either
SGSN or MME) deactivates ISR in the network. It is deactivated in the UE
when the UE cannot perform periodic updates in time. When ISR is activated
and a periodic updating timer expires the UE starts a Deactivate ISR timer.
When this timer expires and the UE was not able to perform the required
update procedure the UE deactivates ISR.
RA TA list
S3
SGSN
MME
HSS
MM
Context
EMM
Context
SGSN & MME
registered
no need to update location due
to UTRAN/E-UTRAN reselection

eNodeB
RNC/BSC

Figure 7-19 Idle state Signalling Reduction
7 Traffic cases
207
UsageoftheTIN UsageoftheTIN UsageoftheTIN UsageoftheTIN
The UE may have valid MM parameters both from MME and from SGSN.
The Temporary Identity used in Next update (TIN) is a parameter of the UE's
MM context, which identifies the UE identity to be indicated in the next RAU
Request or TAU Request message. The TIN also identifies the status of ISR
activation in the UE.
The TIN can take one of the three values, P-TMSI, GUTI or RAT-related
TMSI. The UE sets the TIN when receiving an Attach Accept, a TAU Accept
or RAU Accept message.
RAT-related TMSI,
(P-TMSI)
RAT-related TMSI,
P-TMSI or GUTI
RAU Accept
indicating ISR Activated
P-TMSI any value
RAU Accept
not indicating ISR Activated
RAT-related TMSI,
(GUTI)
RAT-related TMSI, GUTI,
or P-TMSI
TAU Accept
indicating ISR Activated
GUTI any value
TAU Accept
not indicating ISR Activated
P-TMSI any value
Attach Accept via GERAN/UTRAN
(never indicates ISR Activated)
GUTI any value
Attach Accept via E-UTRAN
(never indicates ISR Activated)
TIN value to be set by the
UE when receiving message
Current TIN value stored
by UE
Message received by UE
RAT-related TMSI,
(P-TMSI)
RAT-related TMSI,
P-TMSI or GUTI
RAU Accept
indicating ISR Activated
P-TMSI any value
RAU Accept
not indicating ISR Activated
RAT-related TMSI,
(GUTI)
RAT-related TMSI, GUTI,
or P-TMSI
TAU Accept
indicating ISR Activated
GUTI any value
TAU Accept
not indicating ISR Activated
P-TMSI any value
Attach Accept via GERAN/UTRAN
(never indicates ISR Activated)
GUTI any value
Attach Accept via E-UTRAN
(never indicates ISR Activated)
TIN value to be set by the
UE when receiving message
Current TIN value stored
by UE
Message received by UE

Figure 7-20 Setting of TIN
ISR Activated indicated by the RAU/TAU Accept message but the UE not
setting the TIN to "RAT-related TMSI" is a special situation. Here the UE has
deactivated ISR due to special situation handling (described later in this
section). By maintaining the old TIN value the UE remembers to use the RAT
TMSI indicated by the TIN when updating with the CN node of the other
RAT.
Only if the TIN is set to RAT-related TMSI ISR behaviour is enabled for the
UE, i.e. the UE can change between all registered areas and RATs without
any update signalling and it listens for paging on the RAT it is camped on. If
the TIN is set to "RAT-related TMSI", the UE's P-TMSI and RAI as well as
its GUTI and TAI(s) remain registered with the network and valid in the UE.
When ISR is not active the TIN is always set to the temporary ID belonging to
the currently used RAT. This guarantees that always the most recent context
data are used, which means during inter-RAT changes there is always context
transfer from the CN node serving the last used RAT. The UE identities, old
LTE/EPS Technology

208
GUTI IE and additional GUTI IE, indicated in the next TAU Request
message, and old P-TMSI IE and additional P-TMSI/RAI IE, indicated in the
next RAU Request message depend on the setting of TIN and are specified in
table below.
TIN value
P-TMSI/RAI
P-TMSI/RAI mapped
from GUTI
P-TMSI/RAI
Attach Request via
GERAN/UTRAN
GUTI GUTI
GUTI mapped from
P-TMSI/RAI
Attach Request via
E-UTRAN
P-TMSI/RAI
P-TMSI/RAI mapped
from GUTI
P-TMSI/RAI RAU Request
GUTI GUTI
GUTI mapped from
P-TMSI/RAI
TAU Request
RAT-related TMSI GUTI P-TMSI
Message to be
sent by UE
TIN value
P-TMSI/RAI
P-TMSI/RAI mapped
from GUTI
P-TMSI/RAI
Attach Request via
GERAN/UTRAN
GUTI GUTI
GUTI mapped from
P-TMSI/RAI
Attach Request via
E-UTRAN
P-TMSI/RAI
P-TMSI/RAI mapped
from GUTI
P-TMSI/RAI RAU Request
GUTI GUTI
GUTI mapped from
P-TMSI/RAI
TAU Request
RAT-related TMSI GUTI P-TMSI
Message to be
sent by UE

Figure 7-21 Temporary UE ID to be indicated as old GUTI or old P-TMSI
The UE indicates also information elements additional GUTI or additional
P-TMSI in the Attach Request, TAU or RAU Request. These information
elements permit the MME/SGSN to find the already existing UE contexts in
the new MME or SGSN, when the old GUTI or old P-TMSI indicate
values that are mapped from other identities.
RA#1
TA list
S3
SGSN
MME

eNodeB
RNC/BSC
SGSN RNC/BSC
RA#2
S3

RAU Request (P-TMSI +


additional P-TMSI = mapped GUTI
GUMMEI part of
GUTI identifies MME

Figure 7-22 Additional GUTI/P-TMSI
7 Traffic cases
209
ISRactivation ISRactivation ISRactivation ISRactivation
The information flow in Fig.7-22 shows an example of ISR activation. For
explanatory purposes the figure is simplified to show the MM parts only.
The process starts with an ordinary Attach procedure not requiring any special
functionality for support of ISR. The Attach however deletes any existing old
ISR state information stored in the UE. With the Attach request message, the
UE sets its TIN to "GUTI". After attach with MME, the UE may perform any
interactions via E-UTRAN without changing the ISR state. ISR remains
deactivated. One or more bearer contexts are activated on MME, S-GW and
P-GW, which is not shown in the figure.
The first time the UE reselects GERAN or UTRAN it initiates a Routing Area
Update. This represents an occasion to activate ISR. The TIN indicates
"GUTI" so the UE indicates a P-TMSI mapped from a GUTI in the RAU
Request. The SGSN gets contexts from MME and both CN nodes keep these
contexts because ISR is being activated. The SGSN establishes a control
relation with the S-GW, which is active in parallel to the control connection
between MME and S-GW (not shown in figure). The RAU Accept indicates
ISR activation to the UE. The UE keeps GUTI and P-TMSI as registered,
which the UE memorises by setting the TIN to "RAT-related TMSI". The
MME and the SGSN are registered in parallel with the HSS.
After ISR activation, the UE may reselect between E-UTRAN and
UTRAN/GERAN without any need for updating the network as long as the
UE does not move out of the RA/TA(s) registered with the network.
The network is not required to activate ISR during a RAU or TAU. The
network may activate ISR at any RAU or TAU that involves the context
transfer between an SGSN and an MME. The RAU procedure for this is
shown in Fig. 7-23. ISR activation for a UE, which is already attached to
GERAN/UTRAN, with a TAU procedure from E-UTRAN works in a very
similar way.
LTE/EPS Technology

210
Normal Attach procedure, nothing special for ISR besides
deactivation of any potential old ISR states
Attach Accept (GUTI)
Context Request
HSS interactions
Attach Request (old GUTI = real
GUTI or mapped from P-TMSI)
Attach Accept never indicates ISR
activation so UE sets TIN to GUTI
MME registered
MME SGSN HSS
RAU Request (P-TMSI mapped from GUTI because TIN = GUTI)
Context Res (ISR capability)
Context Ack (ISR activated)
store SGSN ID store MME ID
HSS interactions
SGSN registered
RAU Accept (P-TMSI, ISR)
RAU Accept indicates ISR so UE
sets TIN to RAT-related TMSI
RAU procedure with ISR activation, UE has valid MM contexts for SGSN and
MME, SGSN and MME have valid MM registration from UE, SGSN and MME
are registered with HSS

Figure 7-23 ISR activation
Downlinkdatatransfer Downlinkdatatransfer Downlinkdatatransfer Downlinkdatatransfer
Fig. 7-24 shows a downlink data transfer to an idle state UE when ISR is
activated. The S-GW receives downlink data. Because of activated ISR,
the S-GW has control connections with both MME and SGSN and sends
therefore downlink data notifications to both nodes. MME and SGSN start
their paging procedures, which results in paging of the UE in the registered
RA and TA(s) in parallel.
In the example illustrated in Fig. 7-24 it is assumed that the UE camps on
E-UTRAN. So the UE responds to paging as usual with Service Request. This
triggers the MME to setup the user plane connection between eNodeB and
S-GW. The downlink data are transferred to the UE.
When the UE camps on UTRAN/GERAN it performs the paging response as
specified for these access systems without any required update or other
signalling before. The downlink data are then transferred via
UTRAN/GERAN to the UE.
7 Traffic cases
211
Downlink Data Notification Ack.
S-GW P-GW MME RNC/BSC SGSN
Downlink data
Downlink Data Notification
Downlink Data Notification Ack.
Downlink Data Notification
Paging
Paging
Paging
Paging
Service Request
User Plane Setup User Plane Setup
Downlink data

Fig 7-24 Downlink data transfer (ISR active)
ISRdeactivation ISRdeactivation ISRdeactivation ISRdeactivation
Deactivation of ISR for the UE does not require any specific functionality.
The status of ISR activation is refreshed in every RAU and TAU Accept
message. If there is no explicit indication of ISR Activated in these messages
then ISR is deactivated and the UE sets its TIN to GUTI or P-TMSI, as
specified in Fig. X-XX. This causes always ISR deactivation when a UE
performs a RAU with a Gn/Gp SGSN of any standards release as these
SGSNs never indicate ISR Activated to the UE.
Handlingofspecialsituations Handlingofspecialsituations Handlingofspecialsituations Handlingofspecialsituations
Situations may occur that cause unsynchronized state information in the UE,
MME and SGSN. Such situations are:
modification or activation of additional bearers,
missing periodic updates, e.g. because the coverage of a RAT is lost or
the RAT is no more selected by the UE (this may result also in
implicit detach by SGSN or MME),
CN node change resulting in context transfer between the same type of
CN nodes (SGSN to SGSN or MME to MME),
S-GW change,
change of the UE specific DRX parameters,
change of the UE CN capabilities,
E-UTRAN selection by a UTRAN-connected UE (e.g. when in
URA_PCH to release Iu on UTRAN side).
LTE/EPS Technology

212
There are no ISR specific procedures to handle such situations to avoid
additional complexity and error cases. All special situations that cause context
in the UE, MME and SGSN to become asynchronous are handled by ISR
deactivation. The normal RAU/TAU procedures synchronize contexts in
MME and SGSN and activate ISR again when wanted by the network.

8 Security
213
Chapter Chapter Chapter Chapter8 88 8
Security Security Security Security
Topic Topic Topic Topic Page Page Page Page
Authentication................................................................................................ 215
EPS key hierarchy.......................................................................................... 223
Ciphering & integrity protection.................................................................... 225
Key handling in handover.............................................................................. 230
Key-change-on-the-fly................................................................................... 235
LTE/EPS Technology
214

This page is intentionally left blank
8 Security
215
A AA Authentication uthentication uthentication uthentication
Two security features related to entity authentication are provided:
user authentication: the property that the serving network
corroborates the user identity of the user,
network authentication: the property that the user corroborates that
he is connected to a serving network that is authorised by the user's
Home Environment (HE) to provide him services; this includes the
guarantee that this authorisation is recent.
The entity authentication occurs at each connection set-up between the user
and the network. Two mechanisms have been included: an authentication
mechanism using an Authentication Vector (AV) delivered by the user's
Home network Environment (HE) to the serving network, and a local
authentication mechanism using the integrity key established between the user
and serving network during the previous execution of the Authentication and
Key Agreement (AKA) procedure.
S
e
r
v
i
n
g

N
e
t
w
o
r
k
user authentication
network authentication

Figure 8-1 Entity authentication
A R99 or later USIM application is sufficient for accessing E-UTRAN,
provided that the separation bit in the AMF is not used for operator specific
purposes (e.g. support of multiple authentication algorithms and keys,
changing sequence number verification parameters, setting threshold values to
restrict the lifetime of cipher and integrity keys)
1
.

1
This restriction applies only to separation bit in the AMF. Other bits in the AMF still can be used for operator
specific purposes.
LTE/EPS Technology
216
Additionally for R8 and later USIM application, bits 1 to 7 are reserved for
future standardization use and only bits 8 to 15 can be used for proprietary
purposes.
Access to E-UTRAN with a 2G SIM or a SIM application on a Universal
Integrated Circuit Card (UICC) shall not be granted.
USIM
R99
+
USIM
R99
+
separation bit in the AMF is not used
for operator specific purposes
&
SIM
USIM
R8
+
separation bit in the AMF is not used
for operator specific purposes, bits 1 to
7 reserved for future standardisation
&
NO ACCESS

Figure 8-2 SIM, USIM and separation bit in the AMF
Authenticationand Authenticationand Authenticationand AuthenticationandKeyA KeyA KeyA KeyAgreement greement greement greement
The mechanism described here achieves mutual authentication by the user and
the network showing knowledge of a secret key K which is shared between
and available only to the USIM and the AuC in the user's HE. In addition the
USIM and the HE keep track of counters SQN
MS
and SQN
HE
respectively to
support network authentication. The sequence number SQN
HE
is an individual
counter for each user and the sequence number SQN
MS
denotes the highest
sequence number the USIM has accepted.
Additionally, EPS AKA procedure produces keying material forming a basis
for User Plane (UP), RRC, and NAS ciphering keys as well as RRC and NAS
integrity protection keys.
8 Security
217
Authentication response (RES(i))
Authentication request (RAND(i), AUTN(i))
Authentication data request
(IMSI, MCC+MNC, E-UTRAN)
MME HSS
Authentication data response
(EPS-AV(1..n))
Generate EPS-AVs
Store EPS-AVs
Select EPS-AV(i)
Verify AUTN(i),
compute RES(i)
Compare RES(i) and XRES(i)
Select KASME(i)
Compute CK(i), IK(i)
and KASME(i)
D
i
s
t
r
i
b
u
t
i
o
n

o
f

a
u
t
h
e
n
t
i
c
a
t
i
o
n

v
e
c
t
o
r
s

f
r
o
m

H
E

t
o

S
N
A
u
t
h
e
n
t
i
c
a
t
i
o
n

a
n
d

K
e
y

A
g
r
e
e
m
e
n
t


Figure 8-3 Authentication and Key Agreement (AKA)
The Authentication data request includes the IMSI, Serving Network
identity (i.e. MCC+MNC) and the Network Type (i.e. E-UTRAN).
Upon receipt of a request from the MME, the HE/HSS sends an ordered
array of n EPS-AV(1..n), to the MME. The EPS-AV are ordered based on
sequence number. Each EPS-AV consists of the following components:
Access Stratum Management Entity Key K
ASME,
a random number RAND, an
authentication token AUTN and an expected response XRES.
If the Network Type equals E-UTRAN then the separation bit in the AMF
field of AUTN is set to 1 to indicate to the UE that the authentication vector is
only usable for AKA in an EPS context, if the separation bit is set to 0, the
vector is usable in a non-EPS context only (e.g. GSM, UMTS). For
authentication vectors with the separation bit set to 1, the secret keys:
Ciphering Key (CK) and Integrity protection Key (IK) generated during AKA
shall never leave the HSS.
Each authentication vector is good for one AKA between the MME and the
USIM. Authentication vectors in MME are used on an FIFO basis.
When the MME initiates an EPS AKA, it selects the next EPS-AV from
the ordered array and sends the random challenge RAND and an
authentication token AUTN to the USIM via ME in Authentication Request
message.
At receipt of those parameters, the USIM verifies freshness of the
authentication vector, and than checks whether AUTN can be accepted and if
so, produces a response RES and computes CK and IK. The CK, IK and
Serving Networks identity (SN id) are used by Key Derivation Function
(KDF) in ME to compute K
ASME
. SN id binding implicitly authenticates the
LTE/EPS Technology
218
serving network's identity when the derived keys from K
ASME
are successfully
used. Additionally, an ME accessing E-UTRAN checks during authentication
that the separation bit in the AMF field of AUTN is set to 1 and reject
authentication otherwise.
UE responds with Authentication Response message including RES in case
of successful AUTN and AMF verification. Otherwise UE sends
Authentication Reject message.
The MME compares the received RES with XRES. If they match the MME
considers the EPS AKA to be successfully completed.
Authentication request
(RAND, AUTN, AMF separation bit = 1)
Authentication data request
(Network Type = E-UTRAN)
MME HLR
Authentication data response
(AMF separation bit = 1, EPS-AV, CK, IK)
EPS security context
UE

Figure 8-4 Separation bit (EPS security context)
Authentication request
(RAND, AUTN, AMF separation bit = 0)
Authentication data request
SGSN HLR
Authentication data response
(AMF separation bit = 0, AV (CK, IK))
non-EPS security context

Figure 8-5 Separation bit (non-EPS security context)
If the keys CK, IK resulting from an EPS AKA run were stored in the fields
already available on the USIM R99 R7 for storing keys CK and IK this
could lead to overwriting keys resulting from an earlier run of UMTS AKA.
This would lead to problems when EPS security context and UMTS security
context were held simultaneously (as is the case when security context is
stored e.g. for the purposes of ISR).
8 Security
219
USIM
R99 R7
CK, IK CK, IK
USIM
R99 R7
CK, IK CK, IK
KASME
CK, IK CK, IK
UMTS AKA
EPS AKA
SGSN
MME

Figure 8-6 EPS and UMTS security context conflict (USIM R99 R7)
In case of USIM R8 or later, there are separate files to store EPS, UMTS and
GSM/GPRS security contexts separately so such conflict can not happen.
USIM R8
EFEPSNSC EPS NAS Security Context
EFKeys Ciphering and Integrity Keys
EFKeysPS Ciphering and Integrity Keys for PS domain
EFKc GSM Ciphering key Kc
EFKcGPRS GPRS Ciphering key KcGPRS
USIM R8
EFEPSNSC EPS NAS Security Context
EFKeys Ciphering and Integrity Keys
EFKeysPS Ciphering and Integrity Keys for PS domain
EFKc GSM Ciphering key Kc
EFKcGPRS GPRS Ciphering key KcGPRS

Figure 8-7 Security contexts on USIM R8
LTE/EPS Technology
220
Generationofauthenticationvectors Generationofauthenticationvectors Generationofauthenticationvectors Generationofauthenticationvectors inHE/AuC inHE/AuC inHE/AuC inHE/AuC
Fig. 8-8 shows the generation of an UMTS and EPS-AV by the HE/AuC.
Generate SQN Generate RAND
f1 f2 f3 f4 f5
MAC XRES CK IK AK
SQN RAND AMF K
AUTN := SQN AK || AMF || MAC
UMTS AV := RAND || XRES || CK || IK || AUTN
KDF
KASME
SN id
EPS AV := RAND || XRES || KASME || AUTN

Figure 8-8 Generation of authentication vectors
The HE/AuC starts with generating a fresh sequence number SQN and an
unpredictable challenge RAND. For each user the HE/AuC keeps track of a
counter SQN
HE.

Subsequently the following values are computed:
a Message Authentication Code MAC = f1 (SQN || RAND || AMF)
where f1 is a message authentication function;
an eXpected RESponse XRES = f2 (RAND) where f2 is a message
authentication function;
a Cipher Key CK = f3 (RAND) where f3 is a key generating
function;
an Integrity Key IK = f4 (RAND) where f4 is a key generating
function;
an Anonymity Key AK = f5 (RAND) where f5 is a key generating
function or f5 0;
an Access Stratum Management Entity Key K
ASME
= KDF (CK ||
IK || AK || SQN || SN id) where KDF is a Key Derivation Function.
8 Security
221
Finally the authentication token AUTN = SQN AK || AMF || MAC is
constructed.
AK is an anonymity key used to conceal the sequence number as the latter
may expose the identity and location of the user. The concealment of the
sequence number is to protect against passive attacks only.
An authentication and key management field AMF is included in the
authentication token of each authentication vector. Example uses of AMF
includes:
support multiple authentication algorithms and keys (This mechanism
is useful for disaster recovery purposes. AMF may be used to indicate
the algorithm and key used to generate a particular authentication
vector.)
changing sequence number verification parameters (This mechanism
is used to change dynamically the limit on the difference between the
highest SEQ accepted so far and a received sequence number SEQ).
Fig. 8-9 shows the summary of all authentication parameters.
var. 4-16 octets eXpected authentication RESponse XRES
256 bits Access Stratum Management Entity Key KASME
var. 5-6 digits Serving Networks identification SN id
var. 4-16 octets authentication RESponse RES
128 bits Integrity Key IK
128 bits Cipher Key CK
64 bits Message Authentication Code MAC-S
64 bits Message Authentication Code MAC
16 bits Authentication Management Field AMF
48 bits Anonymity Key AK
48 bits SeQuence Number SQN
128 bits RANDom challenge RAND
128 bits authentication Key K
Length Parameter name
var. 4-16 octets eXpected authentication RESponse XRES
256 bits Access Stratum Management Entity Key KASME
var. 5-6 digits Serving Networks identification SN id
var. 4-16 octets authentication RESponse RES
128 bits Integrity Key IK
128 bits Cipher Key CK
64 bits Message Authentication Code MAC-S
64 bits Message Authentication Code MAC
16 bits Authentication Management Field AMF
48 bits Anonymity Key AK
48 bits SeQuence Number SQN
128 bits RANDom challenge RAND
128 bits authentication Key K
Length Parameter name

Figure 8-9 Authentication parameters
LTE/EPS Technology
222
UserauthenticationfunctionintheUSIM UserauthenticationfunctionintheUSIM UserauthenticationfunctionintheUSIM UserauthenticationfunctionintheUSIM
Upon receipt of the Authentication Request message the UE proceeds as
shown in Fig. 8-10.
f5
AK
RAND AUTN
SQNAK AMF MAC
SQN
f1 f2 f3 f4
XMAC RES CK IK
K
Verify MAC = XMAC Verify that SQN is in the correct range

KDF
KASME
SN id
USIM ME

Figure 8-10 User authentication function
Upon receipt of RAND and AUTN the USIM first computes the anonymity
key AK = f5 (RAND) and retrieves the sequence number SQN = (SQN
AK) AK.
Next the USIM computes XMAC = f1 (SQN || RAND || AMF) and compares
this with MAC which is included in AUTN. If they are different, the user
sends Authentication Reject back to the MME with an indication of the cause
and the user abandons the procedure. In this case, MME initiates an
Authentication failure report procedure towards the HLR. MME may also
decide to initiate a new identification and authentication procedure towards
the user.
Next the USIM verifies that the received sequence number SQN is in the
correct range. If correct, the USIM computes RES = f2 (RAND) and includes
this parameter in a Authentication Response back to the MME.
Next the USIM computes the cipher key CK = f3 (RAND) and the integrity
key IK = f4 (RAND), which are than made available to the ME.
Finally, the ME computes the K
ASME
= KDF (CK || IK || AK || SQN || SN id).


Upon receipt of the Authentication Response the MME compares RES with
the eXpected RESponse XRES from the selected authentication vector. If
XRES equals RES then the authentication of the user has passed. The MME
8 Security
223
also selects the appropriate K
ASME
from the selected authentication vector. If
XRES and RES are different, MME initiates an Authentication failure report
procedure towards the HLR and may also decide to initiate a new
identification and authentication procedure towards the user.
Sequence Sequence Sequence Sequencenumbers numbers numbers numbers
The verification of the SQN by the USIM will cause the MS to reject an
attempt by the MME to re-use a quintet to establish a particular UMTS
security context more than once. In general therefore the MME can use a
quintet only once.
The mechanisms for verifying the freshness of sequence numbers in the
USIM to some extent allows the out-of-order use of sequence numbers. This
is to ensure that the authentication failure rate due to synchronisation failures
is sufficiently low. This requires the capability of the USIM to store
information on past successful authentication events (e.g. sequence numbers).
The mechanism ensures that a sequence number can still be accepted if it is
among the last x = 32 sequence numbers generated. The same minimum
number x needs to be used across the systems to guarantee that the
synchronisation failure rate is sufficiently low under various usage scenarios,
in particular user movement between MMEs which do not exchange
authentication information.
EPSkeyhierarchy EPSkeyhierarchy EPSkeyhierarchy EPSkeyhierarchy
The EPS key hierarchy includes following keys: K
eNB,
K
NASint,
K
NASenc,
K
UPenc,
K
RRCint and
K
RRCenc
(see Fig. 8-11).
USIM / AuC
UE / HSS
UE / ASME
UE / MME
UE / eNB
KNASenc KNASint
KUPenc KRRCint KRRCenc
K
CK, IK
KASME
KeNB

Figure 8-11 EPS key hierarchy
LTE/EPS Technology
224
K
eNB
is a key derived by UE and MME from K
ASME
when the UE goes to
ECM-CONNECTED state or by UE and target eNB during eNB handover.
Keys for NAS traffic:
K
NASint
is used for the protection of NAS traffic with a particular
integrity algorithm This key is derived by UE and MME from K
ASME,
as well as an identifier for the integrity algorithm using the Key
Derivation Function (KDF).
K
NASenc
is used for the protection of NAS traffic with a particular
encryption algorithm. This key is derived by UE and MME from
K
ASME,
as well as an identifier for the encryption algorithm using the
KDF.
Keys for UP traffic:
K
UPenc
is used for the protection of UP traffic with a particular
encryption algorithm. This key is derived by UE and eNB from K
eNB
,
as well as an identifier for the encryption algorithm using the KDF.
Keys for RRC traffic:
K
RRCint
is used for the protection of RRC traffic with a particular
integrity algorithm. K
RRCint
is derived by UE and eNB from K
eNB
, as
well as an identifier for the integrity algorithm using the KDF.
K
RRCenc
is used for the protection of RRC traffic with a particular
encryption algorithm. K
RRCenc
is derived by UE and eNB from K
eNB
as
well as an identifier for the encryption algorithm using the KDF.
Intermediate keys:
NH is a key derived by UE and MME to provide forward security.
The NH is sent by the MME to the eNB using S1signalling.
K
eNB
* is a key derived by UE and eNB when performing an horizontal
or vertical key derivation using a KDF.
E EE E- -- -UTRANkeysettingduringAKA UTRANkeysettingduringAKA UTRANkeysettingduringAKA UTRANkeysettingduringAKA
Authentication and key setting are triggered by the authentication procedure.
Authentication and key setting may be initiated by the network as often as the
network operator wishes. Key setting can occur as soon as the identity of the
mobile subscriber (i.e. GUTI or IMSI) is known by the MME. Key K
ASME
is
stored in the MME and key K
eNB
is derived using the KDF from the key
K
ASME
and transferred to the UE's serving eNB when needed. K
ASME
is stored
in the UE and MME and updated with the next authentication procedure.
8 Security
225
The RRC and UP keys are derived from the K
eNB
using the KDF when
needed.
Authentication
MME eNB
KASME
KeNB
KASME
KeNB KeNB
KNASenc
KNASint
KUPenc KRRCenc KRRCint
KNASenc
KNASint
KUPenc KRRCenc KRRCint

Figure 8-12 E-UTRAN key setting during AKA
Cipher Cipher Cipher Ciphering&integrityprotection ing&integrityprotection ing&integrityprotection ing&integrityprotection
Userandsignallingdataconfidentiality Userandsignallingdataconfidentiality Userandsignallingdataconfidentiality Userandsignallingdataconfidentiality
It is recommended, however it is not mandatory, to use RRC (AS signalling),
NAS signalling and User Plane (UP) data ciphering.
Ciphering provided to RRC signalling prevents UE tracking based on cell
level measurement reports, handover message mapping, or cell level identity
chaining.
All currently available ciphering algorithms are algorithms with a 128-bit
input key. Each EPS Encryption Algorithm (EEA) is assigned a 4-bit
identifier. Currently, the following values have been defined for NAS, RRC
and UP ciphering:
0000 EEA0 null ciphering algorithm
0001 128-EEA1 SNOW 3G based algorithm (same as UEA2)
0010 128-EEA2 AES based algorithm

Figure 8-13 EPS Encryption Algorithms (EEAs)
Implementation of all currently available EEAs is mandatory for UEs and
eNBs (for RRC and UP ciphering) and for UEs and MMEs (for NAS
signalling ciphering).
RRC and UP confidentiality protection is done at PDCP layer. Confidentiality
protection for NAS is provided by the NAS protocol.
LTE/EPS Technology
226
IP
PDCP
RLC
MAC
PHY
UE
RLC
MAC
PHY
eNode B
PDCP
IP
GW
IP

Figure 8-14 User Plane confidentiality (protocols)
NAS
RRC
RLC
MAC
PHY
UE
RLC
MAC
PHY
eNode B
RRC
NAS
MME
PDCP PDCP

Figure 8-15 Control Plane confidentiality (protocols)
The input parameters to the 128-bit EEA algorithms are an 128-bit cipher key
K
RRCenc
, K
UPenc
or K
NASenc
as KEY, a 5-bit bearer identity BEARER which
value corresponds to the radio bearer identity, the 1-bit direction of
transmission DIRECTION, the length of the keystream required LENGTH
and a bearer specific, time and direction dependent 32-bit input COUNT.
In case of RRC and UP ciphering value COUNT corresponds to the 32-bit
PDCP COUNT.
In case of NAS ciphering the COUNT is constructed as follows:
COUNT := 0x00 || NAS OVERFLOW || NAS SQN
Where:
the leftmost 8 bits are padding bits including all zeros.
NAS OVERFLOW is a 16-bit value which is incremented each time
the NAS SQN is incremented from the maximum value.
NAS SQN is the 8-bit sequence number carried within each NAS
message.
8 Security
227
EEA KEY
BEARER
COUNT DIRECTION
LENGTH
KEYSTREAM
BLOCK

PLAINTEXT
BLOCK
CIPHERTEXT
BLOCK
KEYSTREAM
BLOCK

PLAINTEXT
BLOCK
Sender Receiver
EEA KEY
BEARER
COUNT DIRECTION
LENGTH

Figure 8-16 Ciphering of data
Fig. 8-16 illustrates the use of the ciphering algorithm EEA to encrypt
plaintext by applying a keystream using a bit per bit binary addition of the
plaintext and the keystream. The plaintext may be recovered by generating the
same keystream using the same input parameters and applying a bit per bit
binary addition with the ciphertext.
Signallingdataintegrity Signallingdataintegrity Signallingdataintegrity Signallingdataintegrity
Integrity protection, and replay protection, is provided to NAS and RRC
signalling.
When authentication of the credentials on the UICC during Emergency
Calling in Limited Service Mode, can not be successfully performed, the
integrity and replay protection of the RRC and NAS signaling is omitted. This
is accomplished by the network by selecting EIA0 for integrity protection of
NAS and RRC. EIA0 is only used for emergency calls.
User plane packets between the eNB and the UE are not integrity protected.
All currently available integrity protection algorithms are algorithms with a
128-bit input key. Each EPS Integrity Algorithm (EIA) is assigned a 4-bit
identifier. Currently, the following values have been defined:
0000 EIA0 null integrity protection algorithm
0001 128-EIA1 SNOW 3G (same as UIA2)
0010 128-EIA2 AES

Figure 8-17 EPS Integrity protection Algorithms (EIAs)
LTE/EPS Technology
228
Implementation of all currently available EIAs is mandatory for UEs and
eNBs (for RRC signalling integrity protection) and for UEs and MMEs (for
NAS signalling integrity protection).
RRC integrity protection is provided by the PDCP layer between UE and eNB
and no layers below PDCP are integrity protected. NAS integrity protection is
provided by the NAS protocol.
NAS
RRC
RLC
MAC
PHY
UE
RLC
MAC
PHY
eNode B
RRC
NAS
MME
PDCP PDCP

Figure 8-18 Control Plane integrity protection (protocols)
The input parameters to the 128-bit EIA algorithms are an 128-bit integrity
key K
RRCint
or K
NASint
as KEY,
,
a 5-bit bearer identity BEARER (for NAS
constant value 0x00), the 1-bit direction of transmission DIRECTION and a
bearer specific, time and direction dependent 32-bit input COUNT.
In case of RRC integrity protection value COUNT corresponds to the 32-bit
PDCP COUNT.
In case of NAS integrity protection the COUNT is constructed as follows:
COUNT := 0x00 || NAS OVERFLOW || NAS SQN
Where:
the leftmost 8 bits are padding bits including all zeros.
NAS OVERFLOW is a 16-bit value which is incremented each time
the NAS SQN is incremented from the maximum value.
NAS SQN is the 8-bit sequence number carried within each NAS
message.
8 Security
229
EIA KEY
MESSAGE
COUNT DIRECTION
BEARER-ID
MAC-I
Sender Receiver
XMAC-I
EIA KEY
MESSAGE
COUNT DIRECTION
BEARER-ID

Figure 8-19 Integrity protection of NAS/AS messages
Based on these input parameters the sender computes a 32-bit message
authentication code (MAC-I/NAS-MAC) using the integrity algorithm EIA.
The message authentication code is then appended to the message when sent.
The receiver computes the expected message authentication code (XMAC-
I/XNAS-MAC) on the message received in the same way as the sender
computed its message authentication code on the message sent and verifies
the data integrity of the message by comparing it to the received message
authentication code, i.e. MAC-I/NAS-MAC.
The supervision of failed RRC integrity checks is performed both in the ME
and the eNB. In case of failed integrity check (i.e. faulty or missing MAC-I),
the concerned message is discarded.
The supervision of failed NAS integrity checks is performed both in the ME
and the MME. In case of failed integrity check (i.e. faulty or missing
NAS-MAC), the concerned message is discarded except for some NAS
messages that in certain situations are sent by the network before security can
be activated.
NAS integrity is activated with the help of the NAS Security Mode Command
(SMC) procedure immediately after successful authentication. NAS integrity
stays activated until the EPS security context is deleted. While the EPS
security context exists, all NAS messages are integrity protected. In particular
the NAS service request is always be integrity protected and the NAS attach
request message shall be integrity protected if the EPS security context is not
deleted while UE is in EMM-DEREGISTERED. The length of the
NAS-MAC is 32 bit. The full NAS-MAC is appended to all integrity
protected messages except for the Service Request. Only the 16 least
significant bits of the 32 bit NAS-MAC are appended to the Service Request
message.
LTE/EPS Technology
230
Keyhandlinginhandover Keyhandlinginhandover Keyhandlinginhandover Keyhandlinginhandover
The general principle of key handling at handovers is depicted in Fig. 8-20.
K
ASME
NH
K
eNB
*
NH
K
eNB
*
(KeNB)
Initial
NAS uplink COUNT
NCC = 1
NCC = 2
NCC = 0 K
eNB
K
eNB
K
eNB
PCI,
EARFCN-DL
K
eNB
* K
eNB
*
KeNB KeNB KeNB
KeNB* KeNB*
K
eNB
K
eNB
K
eNB
K
eNB
* K
eNB
*
PCI,
EARFCN-DL
PCI,
EARFCN-DL
PCI,
EARFCN-DL
PCI,
EARFCN-DL
PCI,
EARFCN-DL
PCI,
EARFCN-DL
PCI,
EARFCN-DL
K
ASME
NH
K
eNB
*
NH
K
eNB
*
(KeNB)
Initial
NAS uplink COUNT
NCC = 1
NCC = 2
NCC = 0 K
eNB
K
eNB
K
eNB
PCI,
EARFCN-DL
K
eNB
* K
eNB
*
KeNB KeNB KeNB
KeNB* KeNB*
K
eNB
K
eNB
K
eNB
K
eNB
* K
eNB
*
PCI,
EARFCN-DL
PCI,
EARFCN-DL
PCI,
EARFCN-DL
PCI,
K
ASME
NH
K
eNB
*
NH
K
eNB
*
(KeNB)
Initial
NAS uplink COUNT
NCC = 1
NCC = 2
NCC = 0 K
eNB
K
eNB
K
eNB
PCI,
EARFCN-DL
K
eNB
* K
eNB
*
KeNB KeNB KeNB
KeNB* KeNB*
K
eNB
K
eNB
K
eNB
K
eNB
* K
eNB
*
PCI,
EARFCN-DL
PCI,
EARFCN-DL
PCI,
EARFCN-DL
PCI,
EARFCN-DL
PCI,
EARFCN-DL
PCI,
EARFCN-DL
PCI,
EARFCN-DL

Figure 8-20 Handover key chaining
Whenever an initial AS security context needs to be established between UE
and eNB, MME and the UE derive a K
eNB
and a Next Hop (NH) parameter.
The K
eNB
and the NH are derived from the K
ASME
. A NH Chaining Counter
(NCC) is associated with each K
eNB
and NH parameter. Every K
eNB
is
associated with the NCC corresponding to the NH value from which it was
derived. At initial setup, the K
eNB
is derived directly from K
ASME
, and is then
considered to be associated with a virtual NH parameter with NCC value
equal to zero. At initial setup, the derived NH value is associated with the
NCC value one.
The UE and the eNB use the K
eNB
to secure the communication between each
other. On handovers, the basis for the K
eNB
that will be used between the UE
and the target eNB, called K
eNB
*, is derived from either the currently active
K
eNB
or from the NH parameter. If K
eNB
* is derived from the currently active
K
eNB
this is referred to as a horizontal key derivation and if the K
eNB
* is
derived from the NH parameter the derivation is referred to as a vertical key
derivation (see Fig. 8-20). On handovers with vertical key derivation the NH
is further bound to the target Physical Cell Identity (PCI) and its frequency
EARFCN-DL before it is taken into use as the K
eNB
in the target eNB. On
handovers with horizontal key derivation the currently active K
eNB
is further
bound to the target PCI and its frequency EARFCN-DL before it is taken into
use as the K
eNB
in the target eNB.
NH parameters are only computable by the UE and the MME. The MME
provides NH parameters to eNBs.
The MME does not send the NH value to eNB at the initial connection setup.
8 Security
231
Since the MME does not send the NH value to eNB at the initial connection
setup, the NH value associated with the NCC value one can not be used in the
next X2 handover or the next intra-eNB handover, for the next X2 handover
or the next intra-eNB handover the horizontal key derivation will apply.
Initial set-up
no NH
MME
horizontal key
derivation at first HO

Figure 8-21 No NH value at initial set-up
Intra Intra Intra Intra- -- -eNB eNB eNB eNBh hh handover andover andover andover
When the eNB decides to perform an intra-eNB handover it derives K
eNB
*
using target PCI, its frequency EARFCN-DL, and either NH or the current
K
eNB
depending on the following criteria:
the eNB uses the NH for deriving K
eNB
* if an unused {NH, NCC} pair
is available in the eNB (vertical key derivation),
otherwise if no unused {NH, NCC} pair is available in the eNB, the
eNB derives K
eNB
* from the current K
eNB
(horizontal key derivation).
The eNB uses the K
eNB
* as the K
eNB
after handover. The eNB sends the NCC
used for K
eNB
* derivation to UE in Handover Command message.
unused NH, NCC,
S13 S13
KeNB*
HO CMD (NCC)

Figure 8-22 Intra-eNB handover (vertical key derivation)
LTE/EPS Technology
232
HO CMD (NCC)
KeNB, NCC,
S13 S13
KeNB*

Figure 8-23 Intra-eNB handover (horizontal key derivation)
X2 X2 X2 X2- -- -handover handover handover handover
Key handling at X2-handovers is depicted in Fig. 8-24.

P
a
t
h

S
w
i
t
c
h

R
e
q
u
e
s
t
Handover Command (NCC)
MME
Handover Request (KeNB*, NCC)

H
a
n
d
o
v
e
r

C
o
m
p
l
e
t
e

P
a
t
h

S
w
i
t
c
h

R
e
q
.

A
c
k
.

(
N
H
,

N
C
C
)
X2
S1 S1
(NCC, NH) / (NCC, KeNB),
PCI, EARFCN-DL
S13
KeNB*

(NCC, NH) / (NCC, KeNB),


PCI, EARFCN-DL
S13 S13 S13
KeNB*


Figure 8-24 X2-handover
As in intra-eNB handovers, for X2 handovers the source eNB performs a
vertical key derivation in case it has an unused {NH,NCC} pair. The source
eNB first computes K
eNB
* from target PCI, its frequency EARFCN-DL, and
either from currently active K
eNB
in case of horizontal key derivation or from
8 Security
233
the NH in case of vertical key derivation. The target eNB associates the NCC
value received from source eNB with the K
eNB
.
Next the source eNB forwards the {K
eNB
*, NCC} pair to the target eNB.
The target eNB includes the received NCC into the prepared Handover
Command message, which is sent back to the source eNB in a transparent
container and forwarded to the UE by source eNB.
The target eNB uses the received K
eNB
* directly as K
eNB
to be used with
the UE. When the target eNB has completed the handover signalling with the
UE, it sends a Path Switch Request to the MME.
Upon reception of the Path Switch request, the MME increases its locally
kept NCC value by one and compute a new fresh NH by using the K
ASME
and
its locally kept NH value as input.
The MME then sends the newly computed {NH, NCC} pair to the target
eNB in the Path Switch Request Acknowledge message. The target eNB
stores the received {NH, NCC} pair for further handovers and remove other
existing unused stored {NH, NCC} pairs if any.
Because the path switch message is transmitted after the radio link handover,
it can only be used to provide keying material for the next handover procedure
and target eNB. Thus, for X2-handovers key separation happens only after
two hops because the source eNB knows the target eNB keys. The target eNB
can immediately initiate an intra-cell handover to take the new NH into use
once the new NH has arrived in the Path Switch Request Acknowledge.
S1 S1 S1 S1- -- -h hh handover andover andover andover
Key handling at X2-handovers is depicted in Fig. 8-25.
Forward Relocation Request (NH, NCC, KSI, KASME)
MME

H
O

R
e
q
u
i
r
e
d
NCC, NH, PCI,
EARFCN-DL
S13 S13 S13
KeNB*
MME

H
O

R
e
q
u
e
s
t

(
N
H
,

N
C
C
)
Handover Command (NCC)


Figure 8-25 S1-handover
LTE/EPS Technology
234
When an S1-handover is performed, the source eNB does not send any
keys to the MME in the Handover Required message.
Upon reception of the Handover Required message the source MME
computes a fresh {NH, NCC} pair from its stored data. The source MME
stores that fresh pair and send it to the target MME in the Forward Relocation
Request message. The Forward Relocation Request message in addition
contains the K
ASME
that is currently used to compute {NH, NCC} pairs and its
corresponding eKSI. The target MME stores locally the {NH, NCC} pair
received from the source MME.
The target MME then sends the received {NH, NCC} pair to the target
eNB within the Handover Request.
Upon receipt of the Handover Request from the target MME, the target
eNB computes the K
eNB
to be used with the UE by performing the key
derivation with the fresh {NH, NCC} pair received in the Handover Request
and the target PCI and its frequency EARFCN-DL.
The target eNB includes the NCC value from the received {NH, NCC} pair
into the Handover Command to the UE and remove any existing unused
stored {NH, NCC} pairs.
The source MME may be the same as the target MME. If so the single MME
performs the roles of both the source and target MME, i.e. the MME
calculates and stores the fresh {NH, NCC} pair and sends this to the target
eNB.
UEhandling UEhandling UEhandling UEhandling
The UE behaviour is the same regardless if the handover is S1, X2 or intra-
eNB.
If the NCC value the UE receieved in the HO Command message from target
eNB via source eNB is equal to the NCC value associated with the currently
active K
eNB
, the UE derives the K
eNB
* from the currently active K
eNB
and the
target PCI and its frequency EARFCN-DL.
If the UE received an NCC value that was different from the NCC associated
with the currently active K
eNB
, the UE first synchronizes the locally kept NH
parameter by computing fresh NH parameter iteratively (and increasing the
NCC value until it matches the NCC value received from the source eNB via
the HO command message. When the NCC values match, the UE computes
the K
eNB
* from the synchronized NH parameter and the target PCI and its
frequency EARFCN-DL.
The UE uses the K
eNB
* as the K
eNB
when communicating with the target eNB.
8 Security
235
Key Key Key Key- -- -change change change change- -- -on on on on- -- -the the the the- -- -fly fly fly fly
Key-change-on-the-fly consists of re-keying or key-refresh.
K
eNB ,
K
RRC-enc
, K
RRC-int
, and K
UP-enc
key-refresh is initiated by the eNB when
a PDCP COUNTs is about to be re-used (PDCP COUNTs are about to wrap
around) with the same Radio Bearer identity and with the same K
eNB
.
HO Cmd (NCC)
PDCP COUNT
1 1 1 1
b
1 1 1 1
b

Figure 8-26 Key-refresh
K
eNB ,
K
RRC-enc
, K
RRC-int
, K
UP-enc
, K
NAS-enc
and K
NAS-int
re-keying is initiated by
the MME when an EPS AS security context different from the currently
active one is activated.
Re-keying of the entire EPS key hierarchy including K
ASME
is achieved by
first re-keying K
ASME
, then K
NAS-enc
and K
NAS-int
, followed by re-keying of the
K
eNB
and derived keys.
new AKA
MME eNB
NAS SMC
UE Context Modification
Request (KeNB)
HO Cmd

Figure 8-27 Re-keying
LTE/EPS Technology
236
For NAS key change-on-on-the fly, activation of NAS keys is accomplished
by a NAS SMC procedure.
AS Key-change-on-the-fly is accomplished using a procedure based on intra-
cell handover.
K KK K
eNB eNB eNB eNB
re re re re- -- -keying keying keying keying
In case the procedure is initiated by the MME after a successful AKA run
with the UE, the MME derives the new K
eNB
using the new K
ASME
and the
NAS COUNT used in the NAS EMM SECURITY MODE COMPLETE
message. The K
eNB
is sent to the eNB after a successfully completed NAS
SMC in a S1AP UE CONTEXT MODIFICATION REQUEST message
triggering the eNB to perform the re-keying. The eNB runs the key-change-
on-the-fly procedure with the UE. During this procedure the eNB indicates to
the UE that a key change on-the-fly is taking place. The procedure used is
based on an intra-cell handover, and hence the same K
eNB
derivation steps are
taken as in a normal handover procedure.
When the UE receives an indication that the procedure is a key change on-the-
fly procedure, the UE starts to use the K
ASME
from the current EPS NAS
security context as the basis for K
eNB
derivations.
KeNBrefresh KeNBrefresh KeNBrefresh KeNBrefresh
This procedure is based on an intra-cell handover. The K
eNB
chaining that is
performed during a handover ensures that the K
eNB
is re-freshed.
NASkeyre NASkeyre NASkeyre NASkeyre- -- -keying keying keying keying
After an AKA has taken place, new NAS keys from a new K
ASME
are derived.
To re-activate a non-current full native EPS security context after handover
from GERAN or UTRAN, the UE and the MME take the NAS keys

into use
by running a NAS SMC procedure.
MME shall activate fresh NAS keys from an EPS AKA run or activate native
security context with sufficiently low NAS COUNT values before the NAS
uplink or downlink COUNT wraps around with the current security context.
9 EPS Management
237
Chapter Chapter Chapter Chapter9 99 9
EPSManagement EPSManagement EPSManagement EPSManagement
Topic Topic Topic Topic Page Page Page Page
Introduction.................................................................................................... 239
Establishment of new eNB............................................................................. 242
Self optimisation............................................................................................ 244
LTE/EPS Technology

238

This page is intentionally left blank
9 EPS Management
239
Introduction Introduction Introduction Introduction
The E-UTRAN and EPC systems need to be managed. As E-UTRAN and
EPC are evolvements of UMTS, the management also evolves from UMTS.
The complexity of the E-UTRAN/ EPC network places new demands on the
O&M of the network, therefore as well as re-using and evolving existing
management solutions, management solutions for E-UTRAN/ EPC also need
to encompass some new functionality, e.g.:
EPS new O&M functionality:
auto-configuration,
auto-optimisation,
information model discovery,
development of pear-to-pear interfaces.

Figure 9-1 EPS new O&M functionality.
Best practice in O&M has changed dramatically in recent years. This has
been driven both by changes in the networks being managed and also by the
increase in the number and complexity of services being supported on those
networks.
The emphasis has changed from infrastructure management to the
management of services supported on that infrastructure.
There is less focus on having all management applications at the Element
Management System (EMS) layer and greater emphasis on interfaces and data
availability such that the Network Management System (NMS) and Operation
& Support System (OSS) layer have access to the required data.
The concept of Next Generation Networks (NGNs) decouples the supported
services from the underlying access network. It was easier in the days of
voice based services to assume that by managing the infrastructure the
services were also managed. The multitude and complexity of today's
services means that this is no longer the case.
Element Management (EM) is about managing a single domain from a single
vendor. It no longer makes sense to do any significant analysis at this level
since there is a strong interdependency between domains and vendors to
LTE/EPS Technology

240
assure end-to-end QoS. It still makes sense to support some vendor/domain
specific applications at this level, but the emphasis is on support of
standardised interfaces that make the element management data available to
the NMS and OSS.
An increased emphasis on O&M related standards is pivotal in enabling
analysis applications at the NMS and OSS level. This makes it possible to do
end-to-end analysis in the context of services rather than just RAN specific or
CN specific analysis for a given vendors equipment node.
The E-UTRAN/EPC networks will increase the numbers of NE's to be
managed, while at the same time having strong requirements that emphasise
the need to reduce network complexity and lower operating costs.
SelfOrganisingNetwork SelfOrganisingNetwork SelfOrganisingNetwork SelfOrganisingNetwork
In order to reduce the operating expenditure (OPEX) associated with the
management of this larger number of nodes from more than one vendor the
concept of the Self-Organising Network (SON) is introduced. Automation of
some network planning, configuration and optimisation processes via the use
of SON functions can help the network operator to reduce OPEX by reducing
manual involvement in such tasks. In 3GPP R8 many of the signalling
interfaces between network elements are standardised (open) interfaces.
Significant examples in the context of SON are the X2 interface between
eNBs and the S1 interface between eNB and the EPC (e.g. MME, SGW).

MME/S-GW MME/S-GW
eNB eNB
eNB
S1
S1 S1
S1
X2
X2
X2
E-UTRAN
SON
functionality
included

Figure 9-2 Open interfaces (SON context)
9 EPS Management
241
If the solution for a particular SON-related use case is best provided at the
network level the associated SON algorithm(s) will reside in one or more
network elements. This is an example of a distributed SON architecture.
MME/S-GW MME/S-GW
S1
S1 S1
S1
X2
X2
X2
E-UTRAN
SON
algorithm
SON
algorithm
SON
algorithm
SON
algorithm
SON
algorithm

Figure 9-3 SON architecture (distributed)
If the solution is best provided in the existing network management system or
in an additional standalone SON function or server, then the SON
algorithm(s) will most likely reside either at DM or NM level. This is an
example of a centralised SON architecture.
MME/S-GW MME/S-GW
S1 S1
X2 X2
E-UTRAN
Management
system
Management
system
SON
algorithm
X2
S1 S1

Figure 9-4 SON architecture (centralised)
LTE/EPS Technology

242
It may also result that the solution could require SON functionality partly at
the network level and partly in the management system. This is an example of
hybrid SON architecture.
For 3GPP R8 it has been decided that SON algorithms themselves will not be
standardised.
EstablishmentofneweN EstablishmentofneweN EstablishmentofneweN EstablishmentofneweNB BB B
A typical task for operational staff is the introduction of an eNB. This requires
provision of initial configuration to the new cells and neighbouring cell list to
both new and old cells in the surrounding area.
add new cells
modification of
neighbour cell list
initial configuration including
neighbour cell list
modification of
neighbour cell list

Figure 9-5 Introduction of new eNB
It is very likely that in the future EPS networks the establishment of the new
eNB will be performed fully automatically, according to the steps described
below.
The first step is obviously the planning of a new site based on coverage and
capacity requirements. The process can be supported by measurements to
indicate coverage or capacity problems in the network. A first initial set of
parameters I
1
is: location, eNB type, antenna type, cell characteristics
(sectors), required maximum capacity, etc..
After the physical installation of the eNB a first initial self test will start
with a possible report R
1
in case of failure to the network element manager.
In the next step self configuration starts. The eNB requests its basic setup
information: including configuration of IP-address and detection of O&M,
authentication of eNB, association of a GW, downloading of eNB software.
9 EPS Management
243
Then as a second part of the self configuration the initial radio configuration
I
2
will be done. The following data might be provided via the network element
manager from the planning tool or another self-configuration related instance:
cell-id, power settings, antenna tilt, TAI, IP addresses of neighbourhood
eNBs, etc..
In case any data are missing all parameters should be also derivable from a
default value by an auto optimisation and it should be possible to send back
this data to the element manager and the planning tool.
At the end of the procedure it is necessary to inform the neighbour eNBs
about the existence of the new eNB and to include the new cells in the
corresponding neighbourhood list of the neighbouring eNBs and to set
neighbour specific parameters in these cells.
An additional self test like for example a plausibility check of parameter
with possible report R
2
to the element manager could be done.
At the end of the installation the eNB is ready for commercial use and a
test call can be done successfully.
self
optimisation
self
test
2
self
configuration
self
test
1
planning
and
ordering
Planning tool
Network element manager
time
Establishment of new eNodeB Operational State
installation
I
1
I
2
R
1
R
2


Figure 9-6 Introduction of the new eNB
LTE/EPS Technology

244
Selfoptimisation Selfoptimisation Selfoptimisation Selfoptimisation
Optimisationofthe Optimisationofthe Optimisationofthe Optimisationofthen nn neighbourhoodlist eighbourhoodlist eighbourhoodlist eighbourhoodlist
In operational phase, a further optimisation of neighbour list (including
2G/3G) can be done considering e.g. radio measurements of eNBs and UEs or
call events like call drops, handover problems etc.. For this approach RRC
connections (calls, signalling procedures) and their accompanying
measurements can be used to gather the needed information about neighbours.
Known neighbours can be checked if they are really appropriate concerning
real RF conditions, new ones can be included based on information in UEs
about detected cells.
Data processing
cell A cell C cell D cell B
signal strength (A)
signal strength (C)
signal strength (D)
signal strength (B)
configuration data
signal strength (C)
signal strength (A)
signal strength (D)
signal strength (B)
configuration data
signal strength (D)
signal strength (B)
signal strength (C)
signal strength (A)
configuration data
signal strength (B)
signal strength (D)
signal strength (C)
signal strength (A)
configuration data
new neighbour list
and
related parameters
new neighbour list
and
related parameters
new neighbour list
and
related parameters
new neighbour list
and
related parameters

Figure 9-7 Optimisation of neighbour list and related parameters
Coverageandcapacityoptimisation Coverageandcapacityoptimisation Coverageandcapacityoptimisation Coverageandcapacityoptimisation
Another typical operational task is to optimise the network according to
coverage and capacity. Planning tools support this task based on theoretical
models but for both problems measurements must be derived in the network.
Call drop rates give a first indication for areas with insufficient coverage,
traffic counters identify capacity problems.
9 EPS Management
245
Following parameters are identified as possibly beneficial to be optimised
(see Fig. 9-8):
Parameters to be optimised:
subcarriers (subcarriers sets planned for cell borders),
antenna tilt,
power settings,
Radio Resource Management (RRM) parameters.

Figure 9-8 Coverage and capacity optimisation
For a deeper analysis e.g. the detection of the location of these areas detailed
measurements are requested.
The current method for solving these problems and determining the correct
configuration relies upon special tools to analyse RRM related measurements,
interface tracing and drive tests.
For E-UTRAN the appropriate measurements, significant statistical base of
performance measurements, problem specific measurement configuration and
the full support of processing this valuable information shall be supported by
3GPP Telecom Management specifications.
Parameteroptimisation Parameteroptimisation Parameteroptimisation Parameteroptimisationduetotrouble duetotrouble duetotrouble duetotroubleshooting shooting shooting shooting
In a typical workflow performance measurements indicate problems in the
network caused by different reasons (see Fig. 9-9):
high call drop rate
poor Setup Success Rate
poor average throughput
many others
HW defects or SW failures
user failures
wrong or not ideal parameterisation

Figure 9-9 Troubleshooting
Analyses of complex problems currently are based on drive test results,
accompanied by interface traces. Typically signal strengths, Ec/No values of
neighbours, special call events like call drop, handover failures etc. are
valuable indications both for optimisation and trouble shooting purpose. In
special cases even cell and neighbour individual parameterisation must be
found to mitigate problems. Obviously network quality and performance
LTE/EPS Technology

246
could be improved if such individual optimisation could be done by default
for every cell. Further typical configuration failures would be found (if not
already avoided by intelligent self-configuration function) like missing or lost
neighbours, inappropriate hysteresis values, 2G- and 3G-neighbour related
parameter and others.

Figure 9-10 Troubleshooting today (statistics + drivetest)
According to some early 3GPP drafts the optimisation of multiple parameters
in a wider EPS network area will be supported by appropriate O&M
functionality. The efficient transport of information about status of network
elements, their configuration and a smart design to implement self-organising
functionality is announced to be a self-evident feature of an E-UTRAN
system.

Continuousoptimisationduetodynamicchanges Continuousoptimisationduetodynamicchanges Continuousoptimisationduetodynamicchanges Continuousoptimisationduetodynamicchanges
Dynamic resource shifting and optimisation leads to better resource utilisation
and cost effectiveness considering roaming of customer due to their daily
activities. For example, during the day traffic is concentrated more in urban
areas but at night there is a shift towards the suburban areas.
In OFDM the opportunity exists to distribute air interface resources in a
dynamic way to optimise on traffic situation or interference situation. Based
on statistical measurements of power and interference level for single sub-
channels the coordination of sub-channels and dedicated power could be done
in a dynamic way.
9 EPS Management
247
Other parameters beside sub-channels seen as beneficial in this area are
principally antenna parameters, power settings and RRM management
parameters.
f f
f f


Figure 9-11 Dynamic resource shifting
Handovero Handovero Handovero Handoveroptimisation ptimisation ptimisation ptimisation
The future EPS networks should also support automatic optimisation of
handover parameters like: handover neighbour list, neighbour specific
thresholds, margins and hysteresis. The autonomous intelligent optimisation
algorithm should find the optimal configuration based on the following input
parameters:
handover trigger reasons,
Key Performance Indicators (KPIs): cell and neighbour specific HO
success/failure rate, cell and neighbour specific path loss, received
signal strength, interference measurements before HO events,
planning data like maps, location of cells, theoretical path
loss/interference,
drive test results,
traces of interfaces.
In the ideal case all measurements are linked with correct location
information.
LTE/EPS Technology

248
QoSrelatedradioparametersoptimization QoSrelatedradioparametersoptimization QoSrelatedradioparametersoptimization QoSrelatedradioparametersoptimization
The EPS network should also support automated optimisation of the QoS
related radio parameters. For example, the radio parameters influencing
retransmission and discard operation in RLC layer or admission and
congestion control parameters influence significantly the performance
experience.
MBMSnetworko MBMSnetworko MBMSnetworko MBMSnetworkoptimization ptimization ptimization ptimization
Dynamic shifting and optimisation of MBSFN areas leads to better radio
resource utilisation and cost effectiveness considering dynamic change of
distribution of MBMS subscribers.
A typical example of MBMS subscribers change is depicted in Fig. 9-12.
1 2
3 4 5
6 7
8
MBMS users move to the left
MBSFN area
after shrinking
MBSFN area
before shrinking

Figure 9-12 MBSFN area optimisation
We assume that originally there are eight cells within the coverage of the
MBSFN area meaning MBMS services can be delivered to all the eight cells
via SFN transmission mode. However due to the dynamic changes of the
users distribution (e.g. daily activities) there will be no MBMS subscribers in
cell 8 for a certain period of time. In this case, it would be beneficial to shrink
the coverage the MBSFN area to only cover from cell 1 to cell 7 where there
are still MBMS users. When cell 8 is ruled out of the MBSFN area, there will
be more radio resources in the cell 8 that can be used to bear point to point
services from the RRM point of view.
10 Services
249
Chapter Chapter Chapter Chapter10 10 10 10
Services Services Services Services
Topic Topic Topic Topic Page Page Page Page
Introduction.................................................................................................... 251
Network architecture...................................................................................... 253
Identification.................................................................................................. 256
Protocols ........................................................................................................ 258
Traffic cases ................................................................................................... 260
Security .......................................................................................................... 271
Presence Service (PS) .................................................................................... 273
Push-to-talk over Cellular (PoC) ................................................................... 275
Immediate Messaging (IM)............................................................................ 276
Session-based Messaging (SM) ..................................................................... 277
SMS over generic IP-CAN............................................................................ 280
White board communication.......................................................................... 284
Voice Call Continuity (VCC) ........................................................................ 284
Single Radio VCC (SRVCC)......................................................................... 290
LTE/EPS Technology

250

This page is intentionally left blank
10 Services
251
Introduction Introduction Introduction Introduction
IP Multimedia Subsystem (IMS) refers to a network architecture consisting of
an IP-based core network connected to multiple access networks to provide a
converged services to wireless and wireline subscribers. Initially, IMS
standards were defined for 3G UMTS, but the flexibility of the IMS network
architecture has made it attractive to connect other access networks as well.
Additional networks, including GSM, CDMA, CATV, WiFi, WiMAX
networks, enterprise and residential networks, are being added to this
common IMS core.
IMS
(teleservices)
cdma2000 cdma2000
WiFi WiFi
WiMAX WiMAX
CATV CATV
DSL DSL
WiMAX WiMAX
WiFi WiFi
LTE LTE
3GPP CN 3GPP CN
GERAN GERAN
UTRAN UTRAN
HSS I-CSCF
P-CSCF
S-CSCF
(bearer services)

Figure 10-1 IMS possible access networks
Legacy networks address a specific network access as shown below. They can
be described as vertically integrated, i.e. optimized for a particular service
category and typically offer a single service or set of closely related services.
The PSTN and PLMN are examples of vertically integrated networks. The
operator offers everything from subscriber access to service creation and
service delivery across a wholly owned network infrastructure. Each
vertically integrated network incorporates its own protocols, nodes and end-
user equipment. Telephony and data service domains are still kept more or
less separate.
In contrast, the IMS provides switching, control and application processing
across the multiple access networks offered by a particular operator. The IMS
is often shown as a layered network consisting of a connectivity layer, a call
control layer and an applications layer. Networks designed on this layered
principle are described as horizontally integrated.
LTE/EPS Technology

252
P
L
M
N
P
S
T
N
D
a
t
a

N
e
t
C
A
T
V
Connectivity
Network
MGW MGW
Services
Vertical integration Horizontal integration
Access Access Access Access Access Access

Figure 10-2 Vertically and horizontally integrated networks
By layering the design of the network and providing open, standard interfaces,
each part of the network can evolve at its own pace independent of changes in
other parts of the network.
IMS uses the Session Initiation Protocol (SIP) protocol for multimedia session
negotiation and session management. IMS is essentially a mobile SIP network
designed to support this functionality, where IMS provides routing, network
location, and addressing functionalities.
In contrast to the CS and PS domains, the IMS domain enables any type of
media session to be established (e.g. voice, video, text, etc.). It also allows the
service creator the ability to combine services from CS and PS domains in the
same session, and for sessions to be dynamically modified (e.g. adding a
video component to an existing voice session). This capability opens up a
number of new and innovative user-to-user and multi-user services such as
enhanced voice services, video telephony, chat, push-to-talk (PoC) and
multimedia conferencing, all of which are based on the concept of a
multimedia session.
IMS provides solution for operators who want to implement real-time IP
mobile services without gambling on best effort transmission and the resulting
customer dissatisfaction. Real-time mobile IP communication is difficult due
to fluctuating bandwidths and delay, which severely affect the transmission of
IP packets through the network. In classical IP networks, IP transport would
be what is known as best effort, meaning that the network will do its best to
ensure the required bandwidths, but there is no guarantee. The result is that
real-time mobile IP services may function poorly or not at all, depending on
the bandwidth availability and network congestion.
10 Services
253
The Quality of Service (QoS) mechanisms were developed in order to
overcome these issues and provide some type of guaranteed level of
transmission instead of best effort. QoS ensures that critical elements of IP
transmission such as transmission rate, gateway delay and error rates can be
measured, improved and guaranteed in advance. Users are able to specify the
level of quality they require depending on the type of service and the users
circumstances.
Networkarchitecture Networkarchitecture Networkarchitecture Networkarchitecture
The IP Multimedia CN subsystem comprises all CN elements for provision of
multimedia services. This includes the collection of signalling and bearer
related network elements as shown in Fig. 10-3. In the figure, all the functions
are considered implemented in different logical nodes. If two logical nodes
are implemented in the same physical equipment, the relevant interfaces may
become internal to that equipment.
AS I-CSCF BGCF
P-CSCF IM-MGW MRFP
S-CSCF MGCF MRFC
HSS

Figure 10-3 Basic IMS architecture
CallSessionControlFunction(CSCF) CallSessionControlFunction(CSCF) CallSessionControlFunction(CSCF) CallSessionControlFunction(CSCF)
The CSCF may take on various roles as used in the IP multimedia subsystem.
There are three different types of CSCF:
Proxy-CSCF (P-CSCF) is an entry point for the user to the IMS domain. Its
address is discovered by UEs (described later in this chapter). It provides a
simple, generic call control functions as well as potentially providing a SIP
firewall to ensure security of the IMS domain. The P-CSCF always resides in
LTE/EPS Technology

254
the network to which the MS is connected. Additionally, the P-CSCF could
provide access to services that are not user specific but they are specific to the
network, such as emergency calls.
Serving-CSCF (S-CSCF) performs the session control services for the UE. It
maintains a session state as needed by the network operator for support of the
services. Within an operator's network, different S-CSCFs may have different
functionalities. The S-CSCF passes control to Application Servers (ASs) if
required. The S-CSCF routes the call to the PSTN if required by invoking the
BGCF, MGCP and MGW.
Interrogating-CSCF (I-CSCF) is the contact point within an operator's
network for all connections destined to a user of that network operator, or a
roaming user currently located within that network operator's service area.
The I-CSCF also quarries the HSS to determine which S-CSCF the call
should be assigned to.
Fig. 10-4 shows the usage of P-CSCF, S-CSCF and I-CSCF during IMS call.
P-CSCF
Visited A network
Home A Home B
Visited B network
media stream
HSS
I-CSCF S-CSCF
P-CSCF
S-CSCF
P-GW
S-GW
eNB
P-GW
S-GW
eNB

Figure 10-4 CSCF types
ApplicationServer(AS) ApplicationServer(AS) ApplicationServer(AS) ApplicationServer(AS)
An Application Server (AS) offers value added IMS services and resides
either in the user's home network or in a third party location. Examples of
such services include: vice mail, prepaid subscription, push-to-talk and chat.
An Application Server may influence and impact the SIP session on behalf of
the services supported by the operator's network. An AS may host and
execute services.
10 Services
255
HomeSubscriberServer(HSS) HomeSubscriberServer(HSS) HomeSubscriberServer(HSS) HomeSubscriberServer(HSS)
The Home Subscriber Server (HSS) is a database containing information
about subscribers, services they have subscribed to and IP addresses of S-
CSCF they are currently registered to.
SignallingGatewayFunction(SGW) SignallingGatewayFunction(SGW) SignallingGatewayFunction(SGW) SignallingGatewayFunction(SGW)
The SGW performs the signalling conversion (both ways) at transport level
between the SS7 based transport of signalling used in traditional CS networks,
and the IP based transport of signalling (i.e. between SIGTRAN SCTP/IP and
SS7 MTP). The SGW does not interpret the application layer (e.g. MAP,
CAP, BICC, ISUP) messages but may have to interpret the underlying SCCP
or SCTP layer to ensure proper routing of the signalling.
MediaGatewayControlFunction(MGCF) MediaGatewayControlFunction(MGCF) MediaGatewayControlFunction(MGCF) MediaGatewayControlFunction(MGCF)
The Media Gateway Control Function (MGCF) controls the MGW to send or
receive calls to/from PSTN and other CS networks. The MGCF uses SIP
messages to/from the CSCF or BGCF and uses H.248 messages to/from the
MGW.
IMS IMS IMS IMS- -- -MediaGatewayFunction(IMS MediaGatewayFunction(IMS MediaGatewayFunction(IMS MediaGatewayFunction(IMS- -- -MGW) MGW) MGW) MGW)
The IMS - Media Gateway Function (IMS-MGW) may terminate bearer
channels from a switched circuit network and media streams from a packet
network (e.g., RTP streams in an IP network). The IMS-MGW may support
media conversion, bearer control and payload processing (e.g. codec, echo
canceller, conference bridge).
MultimediaResourceFunctionController(MRFC) MultimediaResourceFunctionController(MRFC) MultimediaResourceFunctionController(MRFC) MultimediaResourceFunctionController(MRFC)
The Multimedia Resource Function Controller (MRFC) controls the MRFP to
provide media processing required by the AS. The MRFC uses SIP messages
to/from the Ass and typically uses H.248 messages to/from the MRFP.
MultimediaResourceFunctionProcessor(MRFP) MultimediaResourceFunctionProcessor(MRFP) MultimediaResourceFunctionProcessor(MRFP) MultimediaResourceFunctionProcessor(MRFP)
Media Resources Function Processor (MRFP) performs all of the media
processing required by the ASs for supporting features such as conferencing,
voice mail, recording, voice processing, etc.
LTE/EPS Technology

256
BreakoutGatewayControlFunction(BGCF) BreakoutGatewayControlFunction(BGCF) BreakoutGatewayControlFunction(BGCF) BreakoutGatewayControlFunction(BGCF)
The Breakout Gateway control function (BGCF) selects the network in which
PSTN breakout is to occur and - within the network where the breakout is to
occur - selects the MGCF.
Identification Identification Identification Identification
Useridentities Useridentities Useridentities Useridentities
Every IMS user has one or more Private User Identities. The private identity
is assigned by the home network operator, and used, for example, for
Registration, Authorisation, Administration, and Accounting purposes. This
identity takes the form of a Network Access Identifier (NAI). It is possible for
a representation of the IMSI to be contained within the NAI for the private
identity.
Every IMS user also has one or more Public User Identities. The Public User
Identity(s) are used by any user for requesting communications to other users.
For example, this might be included on a business card. The Public User
Identity/identities take the form of a SIP URI (e.g. sip:
jakub.bluszcz@neofon.tp.pl or sip: 48399571981@neofon.tp.pl).
When using a phone number as the dialled address, the UE can provide this
number in the form of a SIP URI or a TEL URI. This phone number can be in
the form of E.164 format (prefixed with a '+' sign), or a local format using
local dialling plan and prefix. The IMS will interpret the phone number with a
leading '+' to be a fully defined international number.
ENUM/DNStranslation ENUM/DNStranslation ENUM/DNStranslation ENUM/DNStranslation
The E.164 NUmber Mapping (ENUM)/DNS translation mechanism can be
used by all IMS nodes that require E.164 address to SIP URI resolution.
For example, E.164 number 48607221954 is translated into ENUM domain
4.5.9.1.2.2.7.0.6.8.4.e164.arpa.
It is possible that the ENUM/DNS mechanism uses a different top level
domain to that of e164.arpa., therefore, the top level domain to be used for
ENUM domain names is a network operator configurable option in all IMS
nodes that can perform ENUM/DNS resolution.
ENUM databases may contain Number Portability information.
10 Services
257
PublicServiceIdentities PublicServiceIdentities PublicServiceIdentities PublicServiceIdentities
With the introduction of standardized presence, messaging, conferencing, and
group service capabilities in IMS, there is a need for Public Service Identities
(PSIs). These identities are different from the Public User Identities in the
respect that they identify services, which are hosted by ASs. In particular,
PSIs are used to identify groups. For example a chat-type service may use a
PSI (e.g. sip:chatlist_X@example.com) to which the users establish a session
to be able to send and receive messages from other session participants. As
another example, local service may be identified by a globally routable PSI.
The IMS provides the capability for users to create, manage, and use PSI
identities under control of AS. It is possible to create statically and
dynamically a PSI..
Each PSI is hosted by an AS, which executes the service specific logic as
identified by the PSI.
ISIM ISIM ISIM ISIM
An IP Multimedia Services Identity Module (ISIM) is an application running
on a UICC smart card in a UE in the IMS. It contains parameters for
identifying and authenticating the user to the IMS. The ISIM application can
co-exist with SIM and USIM on the same UICC making it possible to use the
same smartcard in both GSM/UMTS and IMS.
The ISIM contains:
Private User Identity,
Home Network Domain Name,
IMS public user identity,
P-CSCF Address,
Secret keys used for IMS AKA.
LTE/EPS Technology

258
Protocols Protocols Protocols Protocols
The key protocols used in IMS are presented in Fig. 10-5.
AS I-CSCF BGCF
P-CSCF IM-MGW MRFP
S-CSCF MGCF MRFC
HSS
SIP Diameter H.248 HTTP SIP Diameter H.248 HTTP SIP Diameter H.248 HTTP

Figure 10-5 Key protocols used in IMS
SIP SIP SIP SIP
Session Initiation Protocol (SIP) is the main signalling protocol used in IMS
networks. It was developed by the IETF and was selected by 3GPP as a
standard for IMS in R5. The function of SIP is to establish, modify and
terminate multimedia sessions with medias such as voice, video and chat
over IP networks, where the media delivery part is handled separately. In SIP
there is just one single protocol, which works end-to-end and supports the
establishment and termination of user location, user availability, user
capability, session set-up and session management. SIP is also designed to
enable additional multimedia sessions and participants to be dynamically
added or removed from a session.
SDP SDP SDP SDP
Session Description Protocol (SDP) is indeed a data format rather than a
protocol. It convey sufficient information to enable participation in a
multimedia session.
10 Services
259
SDP includes description of:
media to use (codec, sampling rate),
media destination (IP address and port number),
session name and purpose,
times the session is active,
contact information,
different types of optional information (e.g. authorisation data).
INVITE sip: UserB@there.com SIP/2.0
Via: SIP/2.0/UDP here.com:5060
To: LittleGuy <sip:UserB@there.com>
CSeq: 1 INVITE
From: BigGuy <sip:UserA@here.com>
Call-ID: 123456@here.com
Subject: Hallo!
Contact: BigGuy <sip:UserA@here.com>
Content-Type: application/sdp
Content-Length: 147
S
D
P
S
I
P

h
e
a
d
e
r
v=0
o=UserA 2890844526 2890844526 IN IP4 here.com
s=Session SDP
c=IN IP4 100.101.102.103
t=0 0
m=audio 49172 RTP/AVP 0
a=rtpmap:0 PCMU/8000
SIP/2.0 200 OK
Via: SIP/2.0/UDP here.com:5060
To: LittleGuy <sip:UserB@there.com>; tag 65a35
CSeq: 1 INVITE
From: BigGuy <sip:UserA@here.com>
Call-ID: 123456@here.com
Subject: Hallo!
Contact: LittleGuy <sip:UserB@there.com>
Content-Type: application/sdp
Content-Length: 134
S
D
P
S
I
P

h
e
a
d
e
r
v=0
o=UserA 2890844527 2890844527 IN IP4 there.com
s=Session SDP
c=IN IP4 100.111.112.113
t=0 0
m=audio 49172 RTP/AVP 0
a=rtpmap:0 PCMU/8000

Figure 10-6 SIP/SDP message structure
Diameter Diameter Diameter Diameter
Diameter is a development of the current RADIUS protocol used as the policy
support and Accounting, Authentication, Authorization (AAA) protocol for
IMS. Diameter is used by the S-CSCF, I-CSCF and the SIP application
servers in the Service Layer, and in their exchanges with the HSS containing
the user and subscriber information. Compared with RADIUS, Diameter has
improved transport it uses Transmission Control Protocol (TCP) or Stream
Control Transmission Protocol (SCTP), instead of UDP.
H.248 H.248 H.248 H.248
H.248 is a control protocol used between media control functions and media
resources. Examples of nodes with media control functions are the Media
Gateway Control Function (MGCF) and Media Resource Function Controller
(MRFC). Typical media resources are the Media Gateway and Media
Resource Function Processor (MRFP).
LTE/EPS Technology

260
IPv6 IPv6 IPv6 IPv6
IPv6 is a network-layer IP standard used by devices to exchange data across a
packet-switched network. It follows IPv4 as the second version of the Internet
Protocol to be formally adopted for general use. Originally, IMS was
specified to use IPv6; however, with 3GPP R6, IMS does provide support for
IPv4 and private address scheme. This means that even though IMS is
expected to drive the adoption of IPv6, it is not dependent on IPv6 availability
in order to be successfully launched.
HTTP HTTP HTTP HTTP
HTTP is used by MRFC to fetch documents (scripts and other resources) from
an AS.
Trafficcases Trafficcases Trafficcases Trafficcases
EPSbearer EPSbearer EPSbearer EPSbearerforSIPsignalling forSIPsignalling forSIPsignalling forSIPsignalling
Prior to communication with the IMS, the UE performs an EPS Attach
procedure and ensures that a EPS bearer context used for SIP signalling is
available. This EPS bearer context remains active throughout the period the
UE is connected to the IMS, i.e. from the initial registration and at least until
the deregistration.
The default EPS bearer context is usually used for SIP signalling, however
any other dedicated EPS bearer context can be used for SIP signalling as well.
UE is informed by the network whether the default EPS bearer context can be
used for SIP signalling (IM CN Subsystem Signaling Flag parameter)
PDN Connectivity Request
EPS
network
Activate Default EPS Bearer Context Accept
IMS IMS Activate Default EPS Bearer Context Request
P-CSCF Address Request
IM CN Subsystem Signaling Flag
P-CSCF Address
IM CN Subsystem Signaling Flag

Figure 10-7 Default EPS bearer for SIP signalling
10 Services
261
If the EPS bearer for SIP signalling establishment is initiated by the UE (i.e. it
is not a default bearer), the UE indicates to the network in the Bearer
Resource Allocation Request message that the request is for SIP signalling, by
setting IM CN Subsystem Signaling Flag. If the request is authorized, the
network establishes a bearer with the appropriate QCI (i.e. QCI=5) and the IM
CN Subsystem Signaling Flag is set in the response message. The UE may
also use this EPS bearer context for DNS and DHCP signalling.
EPSbearer EPSbearer EPSbearer EPSbearerformedia formedia formedia formedia
In EPS, the UE cannot control whether media streams belonging to different
SIP sessions are established on the same EPS bearer context or not. During
establishment of a session, the UE establishes data streams(s) for media
related to the session. Such data stream(s) can result in activation of additional
EPS bearer context(s). Either the UE or the network can request for resource
allocations for media, but the establishment and modification of the EPS
bearer is controlled always by the network.
If the resource allocation is initiated by the UE, the UE starts reserving
resources whenever it has sufficient information about the available media
streams and codecs.
Activate Ded. EPS Bearer Accept
SDP (ack)
SDP (media characteristics)
Activate Ded. EPS Bearer Ctx. Req. (QoS)
Bearer Resource Allocation Req. (QoS)
EPS
network
IMS

Figure 10-8 UE initiated resource allocation
If the UE is configured not to initiate resource allocation for media, then the
UE refrains from requesting additional EPS bearer context(s) for media until
the UE considers that the network did not initiate resource allocation for the
media.
If the resource reservation requests are initiated by the EPS IP-CAN, then the
bearer establishment is initiated by the network after the P-CSCF has
authorised the respective IP flows and provided the QoS requirements and
optionally PCC parameters over the Rx interface to the PCRF..
LTE/EPS Technology

262
eNB S-GW P-GW
PCRF
PCEF
Dedicated Bearer (GBR or non-GBR) P-CSCF
AF
QoS and PCC
IMS EPS

Figure 10-9 Network initiated resource allocation
If the UE receives an activation request from the network for a EPS bearer
context which is associated with the EPS bearer context used for signalling,
the UE correlates, based on the information contained in the Traffic Flow
Template (TFT) information element, the media EPS bearer context with a
currently ongoing SIP session establishment or SIP session modification.
Discovery Discovery Discovery Discovery
In order that the user can make and receive calls, the UE has to be registered
with an S-CSCF. Once registered, users can make and receive IMS domain
calls until they deregister. Before the registration procedure can take place,
the UE has to connect to the network and discover an entry point into the IMS
domain. The entry point is the P-CSCF.
The P-CSCF discovery can be performed using one of the following
mechanisms:
As a part of the establishment of connectivity towards the IP-CAN if
the IP-CAN provides such means. In case when the IP-CAN is an E-
UTRAN based GPRS, discovery can be part of Default/Dedicated EPS
bearer context activation procedure, see Fig. 10-11 and Fig. 10-12. In
case when the IP-CAN is a GERAN/UTRAN based GPRS, discovery
can be a part of PDP Context Activation.
Alternatively, the P-CSCF discovery may be performed after the IP
connectivity has been established by the use of DHCP mechanism or
P-CSCF address or domain name can be preconfigured on ISIM. If the
domain name is known, DNS resolution is used to obtain the IP
address.
The UE decides whether the P-CSCF is to be discovered in the serving
network or in the home network based on local configuration, e.g. whether the
application on the UE is permitted to use local breakout.
10 Services
263
Registration Registration Registration Registration
The application level registration can be initiated after the registration to the
access is performed, and after IP connectivity for the signalling has been
gained from the access network. For the purpose of the registration
information flows, the user is considered to be always roaming. For user
roaming in their home network, the home network performs the role of the
visited network elements and the home network elements.
Visited network Home network
HSS
P-CSCF I-CSCF S-CSCF IP-CAN

Figure 10-10 Functional entities for IMS registration
Fig. 10-10 shows the functional entities involved in registration and Fig. 10-
11 shows the message sequence required.
REGISTER
UAR
200 OK
200 OK
200 OK
O
O
O
O
O
O
O
HSS P-CSCF I-CSCF
S-CSCF
Service control
O
G
Visited Network Home Network
REGISTER
UAA
O
REGISTER
SAR
SAA

Figure 10-11 IMS registration
O The I-CSCF sends the Diameter User-Authentication-Request (UAR) to
the HSS (the message contains user identity and P-CSCF network identifier).
The HSS checks whether the user is registered already. The HSS indicates
whether the user is allowed to register in that P-CSCF network (identified by
the P-CSCF network identifier) according to the user subscription and
operator limitations/restrictions.
LTE/EPS Technology

264
O Diameter User-Authentication-Answer (UAA) is sent from the HSS to the
I-CSCF. It contains the S-CSCF name, if it is known by the HSS, or the
S-CSCF capabilities, if it is necessary to select a new S-CSCF. When
capabilities are returned the I-CSCF performs the new S-CSCF selection
based on the capabilities returned.
O The I-CSCF, using the name of the S-CSCF, shall determine the address of
the S-CSCF through a name-address resolution mechanism. I-CSCF then
sends SIP REGISTER to the selected S-CSCF (message includes: P-CSCF
address/name, user identity, P-CSCF network identifier, UE IP address).
The S-CSCF stores the P-CSCF address/name, as supplied by the visited
network. This represents the address/name that the home network forwards
the subsequent terminating session signalling to the UE.
O The S-CSCF sends Diameter Server-Assignment-Request (SAR), (message
includes: user identity and S-CSCF name) to the HSS.
O The HSS stores the S-CSCF name for that user and returns Diameter
Server-Assignment-Answer (SAA) to the S-CSCF. The information passed
from the HSS to the S-CSCF includes one or more names/addresses
information which can be used to access the platform(s) used for service
control while the user is registered at this S-CSCF. The S-CSCF stores the
information for the indicated user. In addition to the names/addresses
information, security information may also be sent for use within the S-CSCF.
O Based on the filter criteria, the S-CSCF sends register information to the
service control platform and perform whatever service control procedures are
appropriate.
O The S-CSCF returns the SIP 200 OK to the I-CSCF. Than I-CSCF sends
200 OK to the P-CSCF and releases all registration information.
G The P-CSCF store the home network contact information and sends SIP
200 OK to the UE. The P-CSCF may subscribe at the PCRF to notifications of
the status of the IMS Signalling connectivity.
Mobile Mobile Mobile Mobile- -- -to to to to- -- -mobilecall mobilecall mobilecall mobilecall
Once the user is registered with an S-CSCF, voice and multimedia calls may
be made to other users. The S-CSCF provides the main point of control of the
call and any supplementary or advanced services features for that user. SIP
signalling between the UE and the S-CSCF is routed via a P-CSCF, which
provides a (secure) entry point to the IMS domain and a point of flexibility for
routing SIP messages to home or visited network S-CSCFs.
10 Services
265
Each user will be registered with an S-CSCF, so that a simple voice call
between two users will usually required two S-CSCFs to communicate (i.e.
one for each user). Additionally, an I-CSCF is required in order to interrogate
the HSS to find the S-CSCF on which the called user is registered. Fig. 10-14
shows the main functional entities involved in the control of voice calls
between two mobile users. For simplicity, this scenario assumes that both
users are connected to, and registered on, their home network (i.e. they are not
roaming).
As home network Bs home network
A B
IP-CAN IP-CAN
HSS
P-CSCF
I-CSCF S-CSCF
P-CSCF
S-CSCF
media

Figure 10-12 Entities for mobile-to-mobile call
Fig. 10-13 illustrates the SIP signalling flow for a simple mobile-to-mobile
call with a resource reservation phase, based on scenario in Fig. 10-12. It
assumes that the underlying IP-CAN provides the necessary quality of service
for the speech paths (or more generally for media flows selected by the users).
100 TRYING
100 TRYING
LIR/LIA
INVITE
100 TRYING
PRACK
PRACK
183 SESS.PROG
INVITE
100 TRYING
INVITE
183 SESSION PROG.
100 TRYING
HSS P-CSCF A I-CSCF B S-CSCF A S-CSCF B P-CSCF B
INVITE
INVITE
INVITE
100 TRYING
183 SESS.PROG 183 SESS.PROG
183 SESS.PROG
183 SESS.PROG
PRACK
PRACK
PRACK
200 OK
UPDATE
200 OK
180 RINGING
PRACK
200 OK
200 OK
200 OK
200 OK
UPDATE
UPDATE
UPDATE
UPDATE
200 OK
200 OK
200 OK
200 OK
180 RINGING
180 RINGING
180 RINGING
180 RINGING
PRACK
PRACK
PRACK
PRACK
200 OK
200 OK
200 OK
200 OK
180 RINGING
200 OK
200 OK
200 OK
200 OK
200 OK
200 OK
200 OK
ACK
ACK
ACK
ACK
ACK
(multi)media exchange
b
e
a
r
.
a
c
t
.
b
e
a
r
e
r
a
c
t
.


Figure 10-13 Mobile-to-mobile call set-up
LTE/EPS Technology

266
The UE A sends the SIP INVITE message to its P-CSCF A. It includes:
identity of the called party (UE B), SDP information containing requested
media parameters and the list of codecs supported by the UE A.
Upon receipt of the SIP INVITE, the P-CSCF A returns an
acknowledgement (SIP 100 TRYING message) back to the UE A to inform
that the SIP INVITE message has been reliably received by the next hop in
the chain.
Next, the P-CSCF A undertakes some internal checks and procedures. For
example it checks the requested media parameters against the policy of the
visited network operator (e.g. G.711 codec not allowed because of 64 kb/s-
bandwidth necessity) and adds extra parameters related with charging. If all
the checks are passed, the P-CSCF A forwards a slightly modified SIP
INVITE to the S-CSCF A.
Upon receipt of the SIP INVITE the S-CSCF A first of all returns the SIP
100 TRYING message to P-CSCF A. Than, the S-CSCF A identifies the user
and retrieves the user profile which was already downloaded during
registration procedure. Next the S-CSCF A: evaluates the user profile to find
out if and which AS need to be involved, checks SDP parameters against local
network policy , e.g. codec format, analyses the called address to find the
address of an I-CSCF and sends the SIP INVITE message to the I-CSCF
1
.
The I-CSCF acknowledges the message reception by sending back the SIP
100 TRYING message to S-CSCF A.
The I-CSCF queries the HSS about the called subscriber to get informed,
which S-CSCF B is already allocated to that user (during the registration
procedure address of the S-CSCF B was stored in the HSS). It sends the
Diameter Location-Information-Request (LIR), which includes the called
party identity..
The HSS returns the address of the allocated S-CSCF B to the I-CSCF by
means of the Diameter Location-Information-Answer (LIA).
The I-CSCF forwards the SIP INVITE message to the S-CSCF B.
The S-CSCF B sends the SIP 100 TRYING message back to the I-CSCF.

1
In case the called address is a SIP URI (sip: jakub.bluszcz@neofon.tp.pl) or a
SIP URI with mapped telephone number (e.g. sip: 48399571981@neofon.tp.pl), S-CSCF A
contacts DNS to find the address of a SIP server (usually an I-CSCF) in the network neofon.tp.pl.
In case of a TEL URI, which may belong to a PSTN user or GSM user, the S-CSCF contacts
ENUM to get a SIP URI. If there is no SIP URI available, the S-CSCF A will contact the Breakout
Gateway Control Function (BGCF).

10 Services
267
Upon receipt of the SIP 100 INVITE message the S-CSCF B evaluates the
user profile to check if AS are to be involved at the called side.
The S-CSCF forwards the modified SIP INVITE message to the P-CSCF B.
The reception of the SIP INVITE message will be acknowledged by
returning the SIP 100 TRYING message. Then the P-CSCF B carries out a
number of functions related to charging, security, control of P-GW,
compression of signalling, etc. Finally, the modified SIP INVITE message is
forwarded to the UE B.
Upon receipt of the SIP INVITE, the UE B sends the TRYING message
and a SIP 183 SESSION PROGRESS message that contains an SDP answer
to communicate the media streams and codecs the UE B is able to handle for
this session and advice for the UE A to send an updated SDP information
when terminal resource reservation on calling side has been completed (the
calling and the called party will be alerted only when resource reservation has
been completed on both sides).
The SIP 183 SESSION PROGRESS traverses step by step all the nodes
back to the UE A (SDP part of the message contains the list of codecs
supported by both UE A and UE B).
Finally, the SIP 183 SESSION PROGRESS message arrives at the UE A.
Upon receipt of the SIP 183 SESSION PROGRESS message (which includes
the IP-address of UE B) the UE A is informed: whether or not the UE B
accepts a session with the media streams proposed and what codecs are
supported at both ends. The UE A now selects a codec from the list supported
at both ends for each media stream. Then the UE A starts resource
reservation. This is a procedure that is dependent on the underlying IP-CAN.
If the IP-CAN is an EPS network than alternatively, the resource reservation
can be initiated by the network.
Finally, the UE A forwards the SIP PRACK message (including the final
SDP identifying the selected codec) to the UE B. At this time the resource
reservation of UE A most probably is not completed yet.
Upon receipt of the SIP PRACK message the UE B confirms media
streams and codecs by means of the OK message. As the selected codes are
know now also on the UE B side, the UE B starts the resource reservation.
This is a procedure that is dependent on the underlying IP-CAN. If the
IP-CAN is EPS network than alternatively, the resource reservation can be
initiated by the network.
When the necessary resources have been reserved at the calling side, UE A
sends the SIP UPDATE message to UE B.
LTE/EPS Technology

268
As any other message with SDP-content the reception of the SIP UPDATE
message will be acknowledged by the UE B with an SIP 200 OK message
(traversing all the nodes in the chain). At this time the UE B may still be
engaged in resource allocation.
Once resource reservation has been completed at the UE B (as well as at
the calling side - these are independent processes which can be completed in
any order) the UE B starts alerting the B party and generates the SIP 180
RINGING message back to UE B.
Upon receipt of the SIP 180 RINGING message the UE A applies a locally
stored ring tone to the caller and sends the SIP PRACK message to UE B.
The SIP PRACK message is acknowledged by the UE B by sending the SIP
200 OK message to UE A. At this stage the B party gets ringing and the A
party hears ring tone.
When the B party answers (i.e. accepts the session) the UE B sends an SIP
200 OK message.
When the SIP 200 OK message has arrived, the UE A stops ring tone and
forwards the SIP ACK message to UE B to acknowledge the establishment of
a session.
The session set-up is now completed and both parties can generate their
audio and video streams. These media streams are sent end-to-end via the
media plane.
Mobile Mobile Mobile Mobile- -- -to to to to- -- -PSTNcall PSTNcall PSTNcall PSTNcall
Fig. 10-14 shows the main functional entities involved in the control of voice
mobile-to-PSTN calls.
P-CSCF
BGCF
S-CSCF SGW
MGCF
IM-MGW
IP-CAN IP-CAN
IMS PSTN
media
ENUM

Figure 10-14 Entities for mobile-to-PSTN call setup
Fig. 10-15 illustrates the SIP signalling flow for a simple mobile-to-PSTN call
with a resource reservation phase, based on scenario in Fig. 10-16.
10 Services
269
200 OK
media: Ring Back Tone
ACM
INVITE
INVITE
100 TRYING
100 TRYING
100 TRYING
ADD.Req
ADD.Resp
INVITE
100 TRYING
P-CSCF
INVITE
183 SESS.PROG
183 SESS.PROG
183 SESS.PROG
PRACK
PRACK PRACK
IAM
200 OK (PRACK)
UPDATE
180 RINGING
180 RINGING
200 OK (UPDATE)
b
e
a
r
e
r
BGCF S-CSCF MGCF SGW MGW
ENUM
183 SESS.PROG ADD.Req
ADD.Resp
MOD.Req
MOD.Resp
200 OK
UPDATE
UPDATE
200 OK
200 OK
180 RINGING
ANM
MOD.Req
MOD.Resp
200 OK (INVITE)
200 OK
200 OK
ACK
ACK
ACK
media: Voice


Figure 10-15 Mobile-to-PSTN call setup
UE sends the SIP INVITE message to its P-CSCF. It includes user identity
of the called party, which is a TEL-URI (tel: +48323766305).
Upon receipt of the SIP INVITE, by means of sending the SIP 100 TRYING
message the P-CSCF returns an acknowledgement back to the UE.
Next, the P-CSCF undertakes some internal checks and procedures, exactly as
in the previous case of mobile-to-mobile call. If all the checks are passed, the
P-CSCF forwards the modified SIP INVITE to the S-CSCF.
Upon receipt of the INVITE, the S-CSCF allocated to the UE identifies the
user and retrieves the user profile which was already downloaded during
registration procedure. Next the S-CSCF analyses the called address, which
will be a TEL URI and contacts ENUM to resolve TEL URI into SIP URI. In
this case of a call to the PSTN ENUM will not return a SIP URI. It may return
a negative response or a TEL URI. Both these possibilities trigger the S-CSCF
to send SIP INVITE to contact the Breakout Gateway Control Function
(BGCF), specialized in routing SIP requests based on telephone numbers.
Upon receipt of the SIP INVITE the BGCF returns the SIP 100 TRYING
message and analyses the destination address (i.e. the TEL URI). Based on
agreements the home network operator may have for call termination in the
PSTN, the BGCF decides whether the session should be handled by a local
MGCF or by a remote MGCF. If the session to be handled locally, the BGCF
further decides if it wants to stay in the chain of nodes traversing the further
LTE/EPS Technology

270
message flow or not. The BGCF then routes the SIP INVITE message to the
MGCF (in our example to a local MGCF, and announces that it does not wish
to remain in the signalling path for the rest of the session.
Upon receipt of the SIP INVITE message the MGCF returns the SIP 100
TRYING message and selects the SGW and IM-MGW to be used for this
session to meet the required preconditions (one MGCF can control many
SGW and IM-MGW).
Than MGCF request the selected IM-MGW for a new context by sending
H.248 ADD.request. The UEs IP address, RTP port number and the list of
available codecs is specified in the message.
The IM-MGW reserves resources for the RTP connection. The media
connection is marked as one way as the MGCF has not specified the other end
of this connection. The IM-MGE responds with H.248 ADD.response that
includes identity of the allocated context, common codes that are supported
by both UE and IM-MGW, the local IP address and RTP port number.
The MGCF then responds with a SIP 183 SESSION PROGRESS message
that contains an SDP answer to communicate the media streams and codecs
the MGW is able to handle. The 183 SESSION PROGRESS message sent by
the MGCF back to UE includes an SDP body as well as advice for the UE to
send an updated SDP and to communicate when terminal resource reservation
on calling side is completed (the calling and the called party will be alerted
only when resource reservation has been completed on both sides).
Upon receipt of the SIP 183 SESSION PROGRESS message (which
includes the description of the IP speech termination at the MGW) the UE is
informed: whether or not the MGCF accepts a session with the media streams
proposed (for the time being only audio is specified) and what codecs are
supported at the MGW connected to the called PSTN network.
In a meantime the MGCF by sending another H.248 ADD.request is
requesting the IM-MGW for the TDM termination towards the PSTN
network. This termination is requested for the same context that was created
during the previous contact with the IM-MGW.
Since the TDM circuit setup request was received for the same context
identity as the previous RTP context, the IM-MGW associates the RTP and
TDM ports and responds with the H.248 ADD.response that contains TDM
port identity (CIC).
Upon receipt of the SIP PRACK message the MGCF starts resource
modification in the IM-MGW. The H.248 MOD.request modifies the
IM-MGW context to update the IM-MGW about the codecs selected for the
RTP session by the UE. Then, after reception H.248 MOD.response, the
10 Services
271
MGCF confirms final codec format by means of the SIP 200 OK message.
The SIP 200 OK message traverses all the nodes in the chain back to UE.
When the necessary resources have been reserved at the calling side (i.e.
the Dedicated Bearer Activation procedure has been completed), UE sends the
SIP UPDATE message to MGCF (traversing all the nodes in the chain). As
any other message with SDP-content the reception of the SIP UPDATE
message will be acknowledged by the MGCF with an SIP 200 OK message.
As the speech path is completed now at the mobile network side, the
MGCF sends the Initial Address Message (IAM), containing the called party
phone number and the TDM termination identity (CIC) towards the PSTN
exchange.
When the speech path towards the called party is allocated in the PSTN
network the Address Complete Message (ACM) containing the subscriber
free indication is sent to the MGCF. The ACM message also indicates that the
called party in the PSTN network is being alerted. The MGCF performs the
mapping of SS7 signalling and SIP and thus, sends the SIP 180 RINGING
message back to UE.
The ring back tone is fed to the calling subscriber. The IM-MGW converts
the tone into RTP packets. The UE converts it back to the ring back tone and
feeds it to the calling subscriber.
When the called party answers the MGCF receives the ISUP Answer
Message (ANM). At this point, the MGCF issues another H.248
MODIFY.request to allow both-way speech paths to be switched through. The
MGCF then sends a SIP 200 OK message back to the UE, with a session
description indication that two-way media may be sent and received.
When the SIP 200 OK has arrived at the UE, it forwards the SIP ACK
message to MGCF to acknowledge the establishment of a session. The session
set up is now completed and both parties can generate their audio streams.
These media streams are sent end-to-end via the media plane.
Security Security Security Security
In a 3GPP network environment, even when an IMS subscriber has passed the
PS domain authentication, the IMS subscriber's identity must be confirmed by
the IMS authentication again before accessing IMS services. Both the PS
domain and the IMS authentications are necessary for the IMS subscriber.
LTE/EPS Technology

272
This is referred to as a two-pass authentication. However, the PS domain
authentication is carried out by the Authentication and Key Agreement
(AKA) of the 3GPP, called 3GPP AKA; the IMS authentication is carried out
by IMS AKA. Since IMS AKA is based on 3GPP AKA, almost all of the
operations are the same.
GERAN/
UTRAN
IMS
3GPP AKA
3GPP AKA

Figure 10-16 3GPP AKA & IMS AKA
The initial SIP messaging (SIP REGISTER and associated response) is
carried in the clear text (i.e. not encrypted). The response to the first Register
message contains a challenge for the user and key information for the P-
CSCF. The P-CSCF removes the key information before forwarding the
response to the user. The user calculates a response to the challenge and uses
this calculated information to encrypt all future SIP control messages. The
user sends a new register request encrypted, including the challenge response.
The P-CSCF uses the key information to decrypt the message and forward it
in the clear toward the S-CSCF. The S-CSCF examines the response to
authenticate the user. In the downstream direction, the P-CSCF uses the keys
to encrypt the SIP messages before forwarding them to the user.
401 AUTHORIZATION REQ.
MAR/MAA
200 OK
SAR/SAA
REGISTER
UAR/UAA
REGISTER (RES)
REGISTER
REGISTER
401 AUT. REQ.
HSS P-CSCF I-CSCF
S-CSCF
401 AUT. REQ.
REGISTER
REGISTER
UAR/UAA
200 OK
200 OK
(RAND, AUTN, XRES, CK, IK)
(RAND, AUTN)
(RAND, AUTN)
(RAND, AUTN)
(RES)
(RES)

Figure 10-17 IMS authentication
10 Services
273
PresenceService(PS) PresenceService(PS) PresenceService(PS) PresenceService(PS)
The Presence Service (PS) provides the ability for the home network to
manage presence information of a users device, service or service media
even whilst roaming. A users presence information may be obtained through
input from the user, information supplied by network entities or information
supplied by elements external to the network. Consumers of presence
information, watchers, may be internal or external to the home network.
The user can control the dissemination of her/his presence information to
other users and services, and also be able to explicitly identify specifically
which other users and services to which she/he provides presence status.

Figure 10-18 Presence Service
The architectural model for providing presence service is depicted in
Fig. 10-19 below.
Presence User Agent
Presence list
server
Presence server
SIP
HSS
I-CSCF
P-CSCF
S-CSCF
external
watcher
3GPP AAA
PDG
S-CSCF
HSS/HLR
SGSN
GGSN
GMLC
P
r
e
s
e
n
c
e

N
e
t
w
o
r
k

A
g
e
n
t
Presence External Agent

Figure 10-19 Presence Service architecture
LTE/EPS Technology

274
PresenceServer PresenceServer PresenceServer PresenceServer
The Presence Server receives and manage presence information that is
published by the Presence User Agents, Presence Network Agents or External
Agents, and is responsible for composing the presence-related information for
a certain presentity from the information it receives from multiple sources into
a single presence document.
The Presence Server provides also Subscription Authorization Policy. The
Subscription Authorization Policy determines which watchers are allowed to
subscribe to a Presentitys Presence information. The Subscription
Authorization Policy also determines which tuples of the Presentitys
Presence information the watcher has access.
PresenceAgentElements PresenceAgentElements PresenceAgentElements PresenceAgentElements
The function of the Agent elements is to make presence information available
to the Presence Server element in standardized formats across standardized
interfaces.
PresenceUserAgent(PUA) PresenceUserAgent(PUA) PresenceUserAgent(PUA) PresenceUserAgent(PUA)
The Presence User Agent (PUA) collects presence information associated
with a presentity and sends it to the Presence Server. In reality, a PUA may be
located in the users terminal or within a network entity.
PresenceNetworkAgent(PNA) PresenceNetworkAgent(PNA) PresenceNetworkAgent(PNA) PresenceNetworkAgent(PNA)
The Presence Network Agent (PNA) receives presence information from
network elements and publishes it to the Presence Server.
Pres Pres Pres PresenceExternalAgent(PEA) enceExternalAgent(PEA) enceExternalAgent(PEA) enceExternalAgent(PEA)
The Presence External Agent (PEA) supplies Presence information from
external networks and handles the interworking and security issues involved
in interfacing to external networks.
PresenceListServer PresenceListServer PresenceListServer PresenceListServer
The Presence List Server stores grouped lists of watched presentities and
enables a Watcher Application to subscribe to the presence of multiple
presentities using a single transaction. The Presence List Server is
implemented as a SIP Application Server.
10 Services
275
Push Push Push Push- -- -to to to to- -- -t tt talk alk alk alkoverCellular( overCellular( overCellular( overCellular(PoC) PoC) PoC) PoC)
Push-to-Talk over Cellular (PoC) service provides a walkie-talkie like service
in the cellular communication infrastructure. In this service, several
predefined PoC group members participate in one PoC session. Since the PoC
session is half-duplex, only one group member speaks at a time, and the
others listen. Therefore, a user must ask for the floor (the permission to speak)
by pressing the push-to-talk button before he/she starts to talk.

Figure 10-20 Push-to-talk over Cellular (PoC)
The simplified architectural model for providing PoC service is depicted in
Fig. 10-21.
XDMS PS server
PoC server
f
l
o
o
r

c
o
n
t
r
o
l

(
T
B
C
P
)
s
p
e
e
c
h

b
u
r
s
tSIP
HSS
I-CSCF
P-CSCF
S-CSCF

Figure 10-21 PoC architecture
The IMS network provides routing, security and charging support for the PoC
service along with session control based on SIP.
LTE/EPS Technology

276
The PoC server is implementing the application level network functionality.
It is connecting the PoC sessions together. PoC server also multiplies the
speakers bit stream to multiple streams for the participants of the PoC session
and is taking care of floor control. PoC server is also taking case of the voice
transcoding in case of incompatible voice codecs in PoC clients. PoC server is
essentially seen as an AS from the IMS perspective.
The XML Document Management Server (XDMS) is used by the PoC
users to manage groups and lists (e.g. contact and access lists) that are needed
for the PoC service.
A Presence server may provide availability information about PoC users to
other PoC users.
Immediate Immediate Immediate ImmediateMessaging(IM) Messaging(IM) Messaging(IM) Messaging(IM)
IMS users are also able to exchange Immediate Messages (IMs) containing
any type of multimedia content, for example but not limited to: pictures, video
clips, sound clips.
The IM delivery process of the IM is illustrated in Fig. 10-22.
200 OK
200 OK
200 OK
200 OK
200 OK
MESSAGE
MESSAGE
LIR/LIA
MESSAGE
O
MESSAGE
MESSAGE
200 OK G
O
O
O
O
O
O
O
MESSAGE
O
A
B
HSS P-CSCF A I-CSCF B S-CSCF A S-CSCF B P-CSCF B

Figure 10-22 Immediate Messaging (IM)
O UE A generates the multimedia content intended to be sent to UE B and
sends the MESSAGE request to P-CSCF A that includes the multimedia
content in the message body.
O P-CSCF A forwards the MESSAGE request to S-CSCF A along the path
determined upon UE A's most recent registration procedure.
10 Services
277
O Based on operator policy S-CSCF A may reject the MESSAGE request
with an appropriate response, e.g. if content length or content type of the
MESSAGE are not acceptable. S-CSCF A invokes whatever service control
logic is appropriate for this MESSAGE request. This may include routing the
MESSAGE request to an Application Server, which processes the request
further on.
S-CSCF A forwards the MESSAGE request to I-CSCF B.
O I-CSCF B performs Location Query procedure with the HSS to acquire the
S-CSCF address of the destination user (S-CSCF B).
O I-CSCF B forwards the MESSAGE request to S-CSCF B.
O Based on operator policy S-CSCF B may reject the MESSAGE request
with an appropriate response, e.g. if content length or content type of the
MESSAGE are not acceptable. S-CSCF B invokes whatever service control
logic is appropriate for this MESSAGE request. This may include routing the
MESSAGE request to an Application Server, which processes the request
further on. For example, the UE B may have a service activated that blocks
the delivery of incoming messages that fulfil criteria set by the user. The AS
may then respond to the MESSAGE request with an appropriate error
response.
O S-CSCF B forwards the MESSAGE request to P-CSCF B along the path
determined upon UE B's most recent registration procedure.
O P-CSCF B forwards the MESSAGE request to UE#2. After receiving the
MESSAGE UE B renders the multimedia content to the user.
G UE B acknowledges the MESSAGE request with a response that indicates
that the destination entity has received the MESSAGE request. The response
traverses the transaction path back to UE A.
Session Session Session Session- -- -basedMessaging basedMessaging basedMessaging basedMessaging(SM) (SM) (SM) (SM)
If the message because of its length or high QoS requirements can not be
delivered between users as the IM the users can switch to Session-based
Messaging (SM).
SM messages are exchanged between users via a separate traffic bearer. The
SM traffic bearer establishment is very similar to the traffic bearer
establishment for mobile-to-mobile IMS call, that was described earlier. This
solutions protects the IMS signalling network against any load increase due to
transfer of the potentially large SM message.
LTE/EPS Technology

278
The following procedure shows the establishment of a message session
between two terminals.
A
B
messaging session establishment (as for IMS call)
O
message exchange connection establishment (TCP/SCTP)
O
SEND MESSAGE
O
MESSAGE OK
O
HSS P-CSCF A I-CSCF B S-CSCF A S-CSCF B P-CSCF B

Figure 10-23 Session-based Messaging (SM)
O The first step is establishment of the messaging session, which is very
similar to the establishment of the IMS call. The main difference is that SDP
parts of the messages, instead of specifying the real time media connection
parameters, are specifying the type of IP bearer connection suitable for
exchange of message content. For session based messaging the SDP offer in
the first INVITE request may indicate the maximum message size UE#1
accepts to receive and the 200 OK (Offer response) to the INVITE request
may indicate the maximum message size UE B accepts to receive.
O UE A establishes a reliable end-to-end connection with UE B to exchange
the message media.
O UE A generates the message content and sends it to UE B using the
established message connection.
O UE B acknowledges the message with a response that indicates that UE B
has received the message. The response traverses back to UE A. After
receiving the message UE B renders the multimedia content to the user.
Further messages may be exchanged in either direction between UE A and
UE B using the established connection.
SessionbasedmessagingprocedureusingmultipleUEs SessionbasedmessagingprocedureusingmultipleUEs SessionbasedmessagingprocedureusingmultipleUEs SessionbasedmessagingprocedureusingmultipleUEs
Session based messaging between more than two UEs require the
establishment of a session based messaging conference.
Within session based messaging conferences including multiple UEs (e.g.
multiparty chat conferences) an Multimedia Resource Function Processor
(MRFC) / Multimedia Resource Function Processor (MRFP)or an IMS AS is
used to control the media resources.
10 Services
279
When MRFC/MRFP are used, then conferencing principles are used to
provide the chat service:
MRFP establishes message connections with all involved parties,
MRFC/MRFP receives messages from conference participants and to
distribute messages to all or some of the participants,
In order to enable the UE managing information related to the session
based messaging conference the MRFC may be co-located with an
IMS AS.
When an AS is used, then the IMS service control architecture is used to
provide the chat service. Both signalling and user plane are then supported by
the AS.
The originating session based messaging set up using an intermediate server
for a chat service is shown in Fig. 10-26. In this case the intermediate chat
server is addressed by the UE A using a Public Service Identity (PSI). It is
assumed that UE A is the first UE entering the chat session.
O
ACK
200 OK
O
INVITE
ACK
200 OK
INVITE
200 OK
O
O
O
O
INVITE
A
or AS
O
ACK
message exchange connection establishment
O
SEND MESSAGE
MESSAGE OK
O
G
P-CSCF A S-CSCF A
MRFP MRFC

Figure 10-24 Session based messaging using a chat server
O UE A sends the SIP INVITE request addressed to a conferencing or chat
PSI to the P-CSCF. The SDP offer indicates that UE A wants to establish a
message session and contains all necessary information to do that. The SDP
offer may indicate the maximum message size UE A accepts to receive.
O P-CSCF forwards the INVITE request to the S-CSCF.
O S-CSCF may invoke service control logic for UE A.
LTE/EPS Technology

280
O S-CSCF forwards the INVITE request to the MRFC/AS.
MRFC/AS acknowledges the INVITE with a 200 OK, which traverses
back to UE A. The 200 OK (Offer response) may indicate the maximum
message size the host of the PSI accepts to receive.
O Based on operator policy P-CSCF may authorize the resources necessary
for this session.
O UE A acknowledges the establishment of the messaging session with an
ACK towards MRFC/AS.
O UE A establishes a reliable end-to-end connection with MRFP/AS to
exchange the message media.
O UE A sends a message towards MRFP/AS.
G MRFP/AS acknowledges the message.
In the meantime, other users send an INVITE request addressed to the same
conferencing or chat PSI. The initial SDP indicates that the UEs want to
establish a message session and contains all necessary information to do that.
MRFP/AS forwards the message to all recipients, e.g. all participants in the
chat room.
Further messages may be exchanged in either direction between the
participating UEs using the established connection via the MRFC/MRFP or
AS.
SMSovergenericIP SMSovergenericIP SMSovergenericIP SMSovergenericIP- -- -CAN CAN CAN CAN
SMS over generic IP access can be used to support applications and services
that use SMS when a generic IP access is used.
HSS
P-CSCF S-CSCF IP-SM-GW
SMS-GMSC /
SMS-IWMSC
SC

Figure 10-25 SMS over generic IP-CAN architecture
10 Services
281
IP IP IP IP- -- -Short Short Short Short- -- -Message Message Message Message- -- -Gate Gate Gate Gateway(IP way(IP way(IP way(IP- -- -SM SM SM SM- -- -GW) GW) GW) GW)
The IP-SM-GW has the following functions:
IP-SM-GW provides the protocol interworking for delivery of the
Short Message (SM) between the IP-based UE and the SMS-SC. The
message is routed to the SMS-SC for delivery to the SMS-based user
or the message is received from the SMS-SC of an SMS-based UE for
delivery to an IP-based UE.
IP-SM-GW determines the domain (CS/PS or IMS) for delivery of a
SM.
IP-SM-GW appears to the SMS-GMSC and SMS-IWMSC as an MSC
or SGSN and it appears as AS towards the IMS core.
IP-SM-GW communicates with the UE using IMS messaging as
transport while maintaining the format and functionality of the SMS.
HSS HSS HSS HSS
In order to support SMS over generic IP access, the HSS has to be upgraded
to support the following functions:
storing the pre-configured address of the IP-SM-GW on a subscriber
basis (if all subscribers are assigned to a single IP-SM-GW address,
the IP-SM-GW address does not need to be pre-configured in the
HSS);
handling an indication that the terminal is registered with an
IP-SM-GW for delivery of SMS;
responding to the MAP Send Routing Information for Short Message
(SRI for SM) query from IP-SM-GW with the address of the
MSC/SGSN and subscribers IMSI;
forwarding the SRI for SM, from an SMS-GMSC, towards the
IP-SM-GW and forwarding any responses to the originator of the SRI
for SM;
alerting the SCs stored in the message waiting data when the terminal
is registered with an IP-SM-GW for delivery of short message;
reporting notification to the IP-SM-GW of the reachability of a UE at
the transport layer after a delivery failure;
accepting delivery status reports from IP-SM-GWs instead of
SMS-GMSC.
LTE/EPS Technology

282
Registration Registration Registration Registration
After successful IMS registration and based on the retrieved initial Filter
Criteria (iFC), the S-CSCF informs the IP-SM-GW about the registration of
the user.
The IP-SM-GW registers its address (IP-SM-GW No) to the HSS, which in
turn, stores an indication that the UE is available to be accessed via the IMS.
REGISTER REGISTER
HSS
P-CSCF S-CSCF IP-SM-GW

Figure 10-26 SMS over generic IP-CAN registration
MOSMSovergenericIP MOSMSovergenericIP MOSMSovergenericIP MOSMSovergenericIP- -- -CAN CAN CAN CAN
UE sends an encapsulated SM to the S-CSCF, which in turn, forwards it to
IP-SM-GW based on stored iFC.
The IP-SM-GW performs service authorization based on the stored subscriber
data, and if successful, forwards the SM towards the SMS-SC via the
SMS-IWMSC using standard MAP signalling.
P-CSCF S-CSCF
SC
HSS
SMS-GMSC /
SMS-IWMSC
IP-SM-GW

Figure 10-27 MO SMS over generic IP-CAN
10 Services
283
MTSMSover MTSMSover MTSMSover MTSMSovergeneric generic generic genericIP IP IP IP- -- -CAN CAN CAN CAN
The MT SMS delivery process is illustrated in Fig. 10-28.

P-CSCF S-CSCF IP-SM-GW
SC
HSS
SMS-GMSC /
SMS-IWMSC
IP-SMS-GW No
SRI for SM
MSC No
SGSN No
SRI
for
SM
O
O
O
O
O
O
O
Domain selection:
CS/PS/IMS
O

Figure 10-28 MT SMS over generic IP-CAN
O The SMS-SC forwards the SM to the SMS-GMSC.
O The SMS-GMSC interrogates the HSS to retrieve routeing information.
O The HSS forwards the request to the IP-SM-GW.
O If the IP-SM-GW has no information related to the MSISDN of the
destination UE, the IP-SM-GW queries the HSS for routing information.
The HSS returns the addresses of the current MSC and/or SGSN (MSC No /
SGSN No) to the IP-SM-GW for delivery of the SM in CS/PS domain.
O The IP-SM-GW returns its own address to the SMS-GMSC that originated
the routing information query.
O SMS-GMSC delivers the SM to IP-SM-GW, in the same manner that it
delivers the SM to an MSC or SGSN.
O The IP-SM-GW performs domain selection function to determine the
preferred domain for delivering the message according to operator policy and
user preferences.
O If the preferred domain is IMS, the IP-SM-GW forwards the SM
encapsulated in the appropriate SIP method towards the S-CSCF.
The S-CSCF forwards the encapsulated SM to the UE.
LTE/EPS Technology

284
Whiteboardc Whiteboardc Whiteboardc Whiteboardcommunication ommunication ommunication ommunication
So far, there has not been an easy way to electronically communicate via free
format communication. But this drawback is over come with the white board
application. The person in this scenario is actually handwriting a message
when a friend initiates a video call to her/him. This way of creating a message
in a native language including symbols and pictures makes the
communication more personal than a regular e-mail whether in Chinese,
Japanese, English, French or any language.
The users can draw on a blank background, or select to share an image as the
background for drawing, e.g. a map or a floor plan of a building. Both users
can edit the drawing, and both users get to see the complete content. They can
individually store the session content at any time.
HSS
I-CSCF
P-CSCF
S-CSCF
white board session
speech session

Figure 10-29 White board communication
White board communication is usually implemented as a peer-to-peer solution
only using the common IMS nodes (i.e. the AS are not necessary).
VoiceCallContinuity( VoiceCallContinuity( VoiceCallContinuity( VoiceCallContinuity(VCC VCC VCC VCC) )) )
Voice Call Continuity (VCC) is an IMS application that provides capabilities
to transfer voice calls between the CS domain and the IMS.
The solution requires UE capability to simultaneously signal on two different
radio access technologies, e.g. PS eUTRAN and CS GERAN/UTRAN.
All domain transfers associated with a VCC sessions are initiated by the VCC
UE and executed and controlled by the VCC application in the home IMS,
where all the calls from and to a VCC UE are anchored.
10 Services
285
When the VCC UE determines that domain transfer is desirable and possible,
a new call context is established by the VCC UE toward the VCC application
in the home IMS. Signalling and bearer resources are allocated in the
transferring-in domain and the users active session is transferred from the
transferring-out domain. Resources in the transferring-out domain are
subsequently released.
HSS
VCC app
I-CSCF
P-CSCF
S-CSCF
MGCF
MSC
GMSC
gsmSCF
VCC UE

Figure 10-30 VCC architecture
Anchoring Anchoring Anchoring Anchoring
The CS originating voice calls of a VCC UE are re-routed using CAMEL to
the user's home IMS network for anchoring in IMS. The UE establishes the
call using standard call origination procedures; CAMEL origination triggers at
the VMSC then invoke signalling towards the gsmSCF. As a part of the
CAMEL dialogue, the gsmSCF instructs the VMSC to route the call towards
the IMS, where the call is anchored in VCC application.
Fig. 10-31 gives the general overview of the MO call setup for a VCC user
initiated call from CS domain.
MSC
gsmSCF
S-CSCF MGCF
MGW
CS RAN
media
VCC app
A
B
VCC UE

Figure 10-31 MO CS call from the VCC user
VCC UE call origination from IMS domain utilises existing MO. Originating
initial Filter Criteria (iFC) in S-CSCF for the VCC user results in routing of
the IMS originating sessions to the VCC application, that initiates a call to the
remote party on behalf of the user.
LTE/EPS Technology

286
P-CSCF S-CSCF
IP-CAN
media
A
B
VCC UE
VCC app

Figure 10-32 MO IMS call from the VCC user
Voice calls to VCC subscribers coming from the IMS or the CS domain are
anchored in the IMS to facilitate domain transfer and may finally be delivered
to the UE via the IMS or the CS domain. For the calls to be delivered to CS
domain the VCC application, optionally in collaboration with HSS, provides
CS domain Routing Number (CSRN), which is used to reach the VCC UE
while roaming in CS domain.
SIP/TEL
URI
S-CSCF
VCC app
HSS
A B
VCC UE
CSRN
CS
media

Figure 10-33 VCC MT call directed to CS domain
SIP/TEL
URI
S-CSCF
VCC app
A B
VCC UE
IP-CAN
media
P-CSCF

Figure 10-34 VCC MT call directed to IMS
Domaintransfer Domaintransfer Domaintransfer Domaintransfer
Domain transfer procedures enable voice continuity between CS domain and
IMS while maintaining an active voice session when using a VCC UE.
Upon detection of conditions requiring domain transfer, the UE establishes an
Access Leg with the VCC application via the transferred-in domain to request
domain transfer to the transferred-in domain. The VCC application executes
10 Services
287
the Domain Transfer procedure by replacing the Access Leg currently
communicating to the Remote Leg with the Access Leg established via the
transferred-in domain. The Access Leg established via the transferred-out
domain is subsequently released. When the switch of the Access leg from the
transferred-out domain to the transferred-in domain is executed, the Remote
Leg is also updated in order to forward the U-Plane data to the transferred-in
domain.
The execution of the Domain Transfer procedure consists of the following
basic steps:
O The UE establishes an Access Leg via the transferred-in domain after
registering with the transferred-in domain as needed.
O The VCC application performs the Access Leg Update to switch the
Access Leg communicating with the Remote Leg from transferred-out domain
to transferred-in domain. If the remote party is IMS capable, the U-plane path
is switched end-to-end (i.e. between UEs). And if the remote party is
CS/PSTN, U-plane path is switched between VCC UE and MGW. It means
MGW becomes the U-plane anchor point, even if both sides are in CS
domain. The VCC UE switches the voice traffic from the transferred-out
domain to the transferred-in domain as soon as the Access Leg in the
transferred-in domain is fully established.
O Both the VCC UE and the VCC application release the source Access Leg,
which is the Access Leg previously established via the transferred-out
domain.
VCC UE
S-CSCF
VCC app
MGCF
MGW vMSC
CS radio IP-CAN
IP-CAN
IMS
switched
end-to-end
VCC UE
user plane control plane user plane control plane

Figure 10-35 User plane path between VCC UE and IMS UE
LTE/EPS Technology

288
CS UE
S-CSCF
VCC app
MGCF#1
MGW#1 vMSC
CS radio IP-CAN
CS net
IMS
switched
at MGW
VCC UE
MGCF#2
MGW#2
user plane control plane user plane control plane

Figure 10-36 User plane path between VCC UE and CS UE/PSTN
2

IMStoCSdomain IMStoCSdomain IMStoCSdomain IMStoCSdomaintransfer transfer transfer transfer
Fig. 10-37 provides an information flow for Domain Transfer of voice calls
made using VCC UE in IMS to CS domain direction. The flow is based on the
precondition that the user is active in an IMS voice originating or terminating
session at the time of initiation of Domain Transfer to CS.
MSC I-CSCF MGCF VCC app
VCC UE
S-CSCF
O Setup (VDN)
O IAM
O INVITE O INVITE
O Access
Leg Update
O Source
Access Leg
Release

Figure 10-37 Domain transfer IMS to CS domain
O If the user is not attached to the CS domain at the time when the UE
determines a need for Domain Transfer to CS, the UE performs a CS Attach.
It subsequently originates a voice call in the CS domain using the VCC
Domain Transfer Number (VDN) to establish an Access Leg via the CS
domain and request Domain Transfer of the active IMS session to CS
Domain. A VDN is a public telecommunication number (i.e. it has a structure

2
MGW#1 and MGW#2 may be merged.
10 Services
289
of the ISDN telephone number) configured into the UE during initial
provisioning.
O The MSC routes the call towards the user's home IMS network via an
MGCF in the home network.
O The MGCF initiates an INVITE towards the I-CSCF in the home IMS of
the originating VCC user.
O The I-CSCF routes the INVITE directly or via S-CSCF to the VCC
Application.
O The VCC performs the Domain Transfer by updating the Remote Leg with
the connection information of the newly established Access Leg using the
Access Leg Update.
O The source Access Leg (which is the Access Leg previously established
over IMS) is released.
CS CS CS CStoIMS toIMS toIMS toIMSdomaintransfer domaintransfer domaintransfer domaintransfer
Domain transfer from CS to IMS domain is triggered by the VCC UE that
establishes the IMS call towards VCC application by addressing INVITE
message to Session Transfer Identifier (SDI). An SDI is a Tel URI (i.e. it has
a structure of the SIP address) configured into the UE during initial
provisioning.
VCC app
VCC UE
S-CSCF
O INVITE (VDI)
O Access
Leg Update
O Source
Access Leg
Release
O INVITE (VDI)

Figure 10-38 Domain transfer CS to IMS domain
O When the UE determines a need for domain transfer, the UE initiates
registration with IMS. It subsequently initiates an IMS originated session
toward the VCC Application using a VCC Domain Transfer URI (VDI) to
establish an Access Leg via IMS and request Domain Transfer of the active
CS session to IMS. A VCC Domain Transfer URI (VDI) is a SIP URI
configured into the UE during initial provisioning.
LTE/EPS Technology

290
O The IMS session is processed at the S-CSCF and delivered to the VCC
Application.
O The VCC Application completes the establishment of the Access Leg via
IMS and performs the Domain Transfer by updating the Remote Leg with
connection information of the newly established Access Leg.
O The source Access Leg which is the Access leg previously established over
CS is subsequently released.
SingleRadioVCC SingleRadioVCC SingleRadioVCC SingleRadioVCC(SR (SR (SR (SRVCC) VCC) VCC) VCC)
Single Radio Voice Call Continuity (SRVCC) is an IMS application that
provides capabilities to transfer voice calls between the CS domain and the
IMS, that does not require UE capability to simultaneously signal on two
different radio access technologies.
In SRVCC RAT change and domain selection is under network control.
Architecture Architecture Architecture Architecture
The following figure only shows the necessary components related to
SRVCC.
MSC
E-UTRAN
MME
S-GW/P-GW
MSC server
SRVCC enhanced
HSS
Sv
GERAN/
UTRAN
SRVCC
UE
SRVCC
UE
IMS
SGSN

Figure 10-39 SRVCC architecture
10 Services
291
MSC MSC MSC MSCs ss serverenhancedfor erverenhancedfor erverenhancedfor erverenhancedforS SS SRVCC RVCC RVCC RVCC
In addition to the standard MSC server behavior, an MSC server which has
been enhanced for SRVCC provides the following functions:
Handling the Relocation Preparation procedure requested for the voice
component from MME via Sv interface,
Invoking the session transfer procedure from IMS to CS,
Coordinating the CS Handover and session transfer procedures,
Handling the MAP_Update_Location procedure without it being
triggered from the UE.
MME MME MME MME
If the MME supports the interworking to 3GPP CS, the MME in addition to
the standard MME behaviour provides the following functions:
Performing the PS bearer splitting function by separating the voice PS
bearer from the non-voice PS bearers.
Handling the non-voice PS bearers handover with the target cell,
Initiating the SRVCC handover procedure for handover of the voice
component to the target cell via the Sv interface. This procedure is
only triggered once regardless of the number of voice bearers (i.e.
QCI=1) that are in use by the UE.
Coordinating PS handover and SRVCC handover procedures when
both procedures are performed.
SGSN SGSN SGSN SGSN
If the SGSN supports the interworking to 3GPP CS (e.g. from HSPA to
UTRAN/GERAN), the SGSN in addition to the standard SGSN behaviour
provides the following functions:
Performing the PS bearer splitting function by separating the voice PS
bearer from the non-voice PS bearers. VoIP is detected by traffic
class=conversational and SSD='speech'.
Handling the non-voice PS bearers handover with the target cell.
Initiating the SRVCC handover procedure for handover of the voice
component to the target cell via the Sv interface.
Coordinating PS handover and SRVCC handover procedures when
both procedures are performed.
LTE/EPS Technology

292
UEenhancedforSRVCC UEenhancedforSRVCC UEenhancedforSRVCC UEenhancedforSRVCC
3GPP SRVCC UE is needed to perform SRVCC.
The SRVCC UE indicates to the network that the UE is SRVCC capable
when being configured for using IMS speech service supported by the home
operator and the operator policy on the SRVCC UE does not restrict the
session transfer.
E EE E- -- -UTR UTR UTR UTRAN AN AN AN
Between UE and E-UTRAN, no additional functionality is required for the
E-UTRAN. When E-UTRAN selects a target cell for SRVCC handover, it
needs to send an indication to MME that this handover procedure requires
SRVCC. E-UTRAN may be capable of determining the neighbour cell list
based on the SRVCC operation possible indication and/or presence of
established QCI=1 bearers for a specific UE.
UTRAN(HSPA) UTRAN(HSPA) UTRAN(HSPA) UTRAN(HSPA)
When HSPA capable UTRAN selects a target cell for SRVCC handover, it
needs to send an indication to SGSN that this handover procedure requires
SRVCC.
UTRAN may be capable of determining the neighbour cell list based on the
SRVCC operation possible indication and/or presence of established voice
bearers (i.e. bearers with Traffic Class = Conversational and Source Statistic
Descriptor = 'speech') for a specific UE.
HSS HSS HSS HSS
The SRVCC STN-SR and MSISDN are downloaded to MME from HSS
during E-UTRAN attach procedure.
The Session Transfer Number for Single Radio Voice Call Continuity (STN-
SR) is a public telecommunication number (E.164) and is used by the MSC
Server to request session transfer of the media path from the PS domain to CS
domain.
10 Services
293
Procedures Procedures Procedures Procedures
E EE E- -- -UTRAN UTRAN UTRAN UTRANAttachprocedureforSRVCC AttachprocedureforSRVCC AttachprocedureforSRVCC AttachprocedureforSRVCC
E-UTRAN attach procedure for 3GPP SRVCC UE is performed as ordinary
E-UTRAN attach with the following additions:
SRVCC UE includes the SRVCC capability indication as part of the
UE Network Capability in the Attach Request message. MME stores
this information for SRVCC operation.
SRVCC UE includes the GERAN Classmark (if GERAN access is
supported) in the Attach Request message.
If the subscriber is allowed to have SRVCC in the VPLMN then HSS
includes SRVCC STN-SR and MSISDN in the Insert Subscriber Data
message to the MME.
MME includes a SRVCC operation possible indication in the S1 AP
Initial Context Setup Request, meaning that both UE and MME are
SRVCC-capable.
CallflowsforSRVCCfromE CallflowsforSRVCCfromE CallflowsforSRVCCfromE CallflowsforSRVCCfromE- -- -UTRAN UTRAN UTRAN UTRANtoGERAN toGERAN toGERAN toGERAN
Fig. 10-40 gives the general overview of the User and Control Plane paths
towards the SRVCC mobile during domain transfer.
SRVCC
UE
SRVCC
UE
IMS
MSC
E-UTRAN S/P-GW
MGW GERAN

Figure 10-40 User Plane path (SRVCC)
Depicted in Fig. 10-41 is a call flow for SRVCC from E-UTRAN to
GERAN. It is assumed that the GERAN network is not supporting Dual
Transfer Mode (DTM), hence the non-voice PS bearers have to be suspended.
It is further assumed that the MSC server enhanced for SRVCC controls the
target BSS, so the functions of the MSC server enhanced for SRVCC are
LTE/EPS Technology

294
merged with those of the target MSC. In case another MSC controls the target
BSS, the MSC-MSC handover is executed.
Upd.
Loc.
HO Request/Ack
E-UTRAN MME
MSCs/
MGW
SGSN GERAN S-GW IMS
Mes. Report
HO Required
PS to CS Req
Initiation of Session Transfer (STN-SR)
Session Transfer and
Update remote end
PS to CS Rsp
Release of IMS
access leg
HO Command
HO from
EUTRAN Cmd
HO Detection
Suspend
Suspend
Suspend Request/Response
Update bearer
HO Complete
PS to CS
Com./Ack.
HSS

Figure 10-41 SRVCC from E-UTRAN to GERAN (without DTM)
UE sends measurement reports to E-UTRAN.
Based on UE measurement reports the source E-UTRAN decides to trigger
an SRVCC handover to GERAN. E-UTRAN sends Handover Required
(target cell identifier, SRVCC handover indication and some other parameters
to be transparently sent from E-UTRAN to GERAN) message to the source
MME.
Based on the QCI associated with the voice bearer (QCI=1) and the
SRVCC handover indication, the source MME splits the voice bearer from the
non voice bearers and initiates the PS-CS handover procedure for the voice
bearer only towards MSC Server. The MME sends a SRVCC PS to CS
Request (STN-SR, MSISDN, MM Context) message to the MSC Server. The
MSC server is selected based on the target cell identifier received in the
Handover Required message. The MME received STN-SR and MSISDN
from the HSS as part of the subscription profile downloaded during the
E-UTRAN attach procedure. The MM Context contains security related
information. CS security key is derived by the MME from the E-UTRAN/EPS
domain key.
MSC server performs resource allocation with the target BSS by
exchanging Handover Request/ Acknowledge messages.
10 Services
295
MSC Server initiates the Session Transfer by using the STN-SR e.g. by
sending an ISUP IAM (STN-SR) message towards the IMS. Standard IMS
Service Continuity procedures are applied for execution of the Session
Transfer.
During the execution of the Session Transfer procedure the remote end is
updated with the SDP of the CS access leg. The downlink flow of VoIP
packets is switched towards the CS access leg at this point.
Source IMS access leg is released.
MSC Server sends a SRVCC PS to CS Response message (description of
resources already allocate din GERAN )to the source MME. Source MME
knows that at the end of the PS-CS handover the non-GBR bearers should be
preserved.
MME sends a Handover Command message to the E-UTRAN. The
message includes information about the voice component only.
E-UTRAN sends a Handover from E-UTRAN Command message to the
UE.
UE tunes to GERAN and Handover Detection at the GERAN occurs.
UE starts the Suspend procedure. This triggers the SGSN to send a
Suspend Request message to the MME. The MME returns a Suspend
Response to the SGSN, which contains the MM and PDP contexts of the UE.
The MME also starts the preservation of non-GBR bearers and the
deactivation of the voice bearer.
GERAN sends a Handover Complete message to the MSC.
MSC Server sends a SRVCC PS to CS Complete Notification message to
the source MME, informing it that the UE has arrived on the target side.
Source MME acknowledges the information by sending a SRVCC PS to CS
Complete Acknowledge message to the MSC Server.
MSC Server may perform a MAP Update Location to the HSS/HLR if
needed. This may be needed for MSC Server to receive GSM Supplementary
Service information and routing of mobile terminating calls. This Update
Location is not initiated by the UE
After the CS voice call is terminated and if the UE is still in GERAN, then the
UE resumes PS services by sending a Routeing Area Update Request message
to the SGSN.
LTE/EPS Technology

296
This page is intentionally left blank

11 CSFB and SMSoSGs
297
Chapter Chapter Chapter Chapter11 11 11 11
CSFBandSMSoSGs CSFBandSMSoSGs CSFBandSMSoSGs CSFBandSMSoSGs
Topic Topic Topic Topic Page Page Page Page
Introduction.................................................................................................... 299
Architecture.................................................................................................... 300
Co-existence with IMS .................................................................................. 301
Attach procedure............................................................................................ 303
TA/LA update procedure ............................................................................... 305
Mobile originating call................................................................................... 307
Mobile Terminating Call................................................................................ 309
SMS................................................................................................................ 312
LTE/EPS Technology

298

This page is intentionally left blank
11 CSFB and SMSoSGs
299
Introduction Introduction Introduction Introduction
The CS FallBack (CSFB) in EPS enables the provisioning of voice and other
CS-domain services (e.g. CS UDI video, LCS, USSD) by reuse of CS
infrastructure when the UE is served by E-UTRAN. A CSFB enabled
terminal, connected to E-UTRAN may use GERAN or UTRAN to connect to
the CS-domain. This function is only available in case E-UTRAN coverage is
overlapped by either GERAN coverage or UTRAN coverage.
O CS domain service
MSC
server
MME E-UTRAN
SGs
GERAN
/UTRAN
CS network
OPaging or Service Request
O HO or cell
reselection
CS-domain service
examples:
voice,
CS UDI video,
LCS,
USSD

Figure 11-1 CS FallBack (CSFB)
This chapter also describes the architecture required for SMS over SGs
(MMEMSC interface). The MO SMS and MT SMS are signalled over SGs
and do not cause any CS Fallback to GERAN/UTRAN RATs, and
consequently does not require any overlapped GERAN/UTRAN coverage.
MSC
server
MME E-UTRAN
SMS-IWMSC/
SMS-GMSC
SMS-SC
HSS
SGs
SMS

Figure 11-2 SMS over SGs
LTE/EPS Technology

300
Architecture Architecture Architecture Architecture
The CSFB and SMS over SGs in EPS function is realized by using the SGs
interface mechanism between the MSC Server and the MME.
E-UTRAN
server
Sv
S3
Gs
SGs
MME
UTRAN
GERAN MSC
SGSN

Figure 11-3 CS Fallback and SMS over SGs architecture
SGs is an interface between the MME and MSC server. It is used for the
Mobility Management (MM) and paging procedures between EPS and CS
domain, and is based on the Gs (VLR-SGSN) interface procedures. The SGs
reference point is also used for the delivery of both Mobile Originating and
Mobile Terminating SMS (MO-SMS and MT-SMS).
S3 is an interface between MME and SGSN. It has additional functionality to
support CSFB with ISR.
Protocolstack Protocolstack Protocolstack Protocolstack
SGsAP
IP
L2
L1
MME
IP
L2
L1
MSC
server
SGsAP
SCTP SCTP

Figure 11-4 SGs protocol stack
11 CSFB and SMSoSGs
301
SGs Application Part (SGsAP) protocol is used to connect an MME to an
MSC Server. SGsAP is based on the BSSAP+ protocol, used earlier on Gs
(SGSN-VLR) interface.
Stream Control Transmission Protocol (SCTP) transfers signalling messages.
Co Co Co Co- -- -existencewithIMS existencewithIMS existencewithIMS existencewithIMS
For UE originating calls, the UE performs access domain selection. The
service domain selection functionality decides whether the call is serviced in
the CS domain or the IMS. Service domain selection functionality may take
into account for originating calls whether the user is roaming or not, user
preferences, service subscription and operator policy. If the UE is configured
for Voice over IMS, the service domain selection functionality takes the IMS
voice over PS session supported indication into account and should only
initiate IMS voice calls (with the voice bearer in the PS domain) using the
RAT where the IMS voice over PS session supported indication applies and
indicates support. The "IMS voice over PS session supported indication"
applies to E-UTRAN when received in E-UTRAN, and applies to UTRAN
when either received in GERAN or UTRAN.
SGSN
MME
Attach accept / RAU Accept
Attach accept / TAU Accept
IMS voice over PS session
supported indication
IMS voice over PS session
supported indication
EPS attach result: EPS only / combined EPS/IMSI attach
Additional result: - / CSFB not preferred / SMS only

Figure 11-5 IMS voice over PS session supported indication
LTE/EPS Technology

302
To allow for appropriate domain selection, the CSFB and IMS capable UE in
E-UTRAN can be provision with the HPLMN operator preferences on how a
CSFB/IMS enabled UE is supposed to handle vice services:
CS Voice only: the UE does not attempt to initiate voice sessions over
IMS using a PS bearer. The UE attempts combined EPS/IMSI attach.
CS Voice preferred, IMS PS Voice as secondary: the UE tries
preferably to use the CS domain to originate and terminate voice calls.
The UE attempts combined EPS/IMSI attach and if combined
EPS/IMSI attach fails for the CS domain or succeeds with an SMS
only indication or succeeds with a CSFB Not Preferred indication, the
UE attempts voice over IMS.
IMS PS Voice preferred, CS Voice as secondary: the UE tries
preferably to use IMS to originate and terminate voice sessions. If the
UE fails to use IMS for voice e.g. due to IMS voice over PS session
supported indication indicates voice is not supported, then the
services are provided using CS domain. The UE can either perform
combined EPS/IMSI attach or EPS attach when attaching to
E-UTRAN.
IMS PS Voice only: the UE does not attempt combined EPS/IMSI
attach (to support voice services) and perform IMS registration
indicating support for voice.
A CSFB/IMS enabled UE may behave in either a Voice centric or Data
centric way:
UE acting in a Voice centric way always tries to ensure that Voice
service is possible. A CSFB/IMS enabled UE acting in a Voice
centric way that cannot obtain IMS voice over PS session service,
selects a cell of any RAT that provides access to the CS domain. In
this case, when CSFB is not supported in the network, the UE camps
only on RATs that provides access to the CS domain (e.g. GERAN
and UTRAN) and disable E-UTRAN capability.
Upon receiving combined EPS/IMSI attach accept with SMS only
indication or with CSFB Not Preferred indication, a voice centric UE
that fails to use IMS reselects to another RAT.
UE acting in a Data centric way always tries to ensure it gets PS
data connectivity, e.g. the UE stays in the current RAT for PS data
connectivity even when voice service is not obtained. A CSFB/IMS
enabled UE acting in a Data centric way that cannot obtain IMS
voice over PS session service in EPS, continues to stay in EPS even
when the EPS does not support CSFB.
11 CSFB and SMSoSGs
303
Upon receiving combined EPS/IMSI attach accept with SMS only
indication, a data centric UE stays in the current RAT.
Upon receiving combined EPS/IMSI attach accept with CSFB Not
Preferred indication, a data centric stays in the current RAT and is
allowed to use CSFB.
CS Voice only
CS Voice preferred, IMS PS Voice as secondary
IMS PS Voice preferred, CS Voice as secondary
IMS PS Voice only
Voice centric
Data centric

Figure 11-6 UE configuration (domain selection)
SMSoverIP SMSoverIP SMSoverIP SMSoverIP
If a UE is configured to use SMS over IP services it shall, if registered to
IMS, send SMS over IMS, even if it is EPS/IMSI attached.
The home operator is able to activate/deactivate the UE configuration to use
SMS over IP by means of device management in order to allow alignment
with HPLMN support of SMS over IP.
Attachprocedure Attachprocedure Attachprocedure Attachprocedure
The attach procedure for the CS fallback and SMS over SGs in EPS is
realized based on the combined GPRS/IMSI Attach procedure specified
earlier for the Gs interface.
LTE/EPS Technology

304
MME MSC/VLR HSS
OAttach Request
O Security procedures, registration and bearer establishment as in ordinary attach procedure.
O VLR number derivation
OLocation Update Req.
O SGs association creation
O Location Update in CS domain
OLocation Update Accept
OAttach Accept

Figure 11-7 Attach procedure
O The UE initiates the attach procedure by the transmission of an Attach
Request. message to the MME. The Attach Type parameter indicates that the
UE requests a combined EPS/IMSI attach and informs the network that the
UE is capable and configured to use CS fallback. If the UE needs SMS
service but not CSFB, the UE includes an SMS-only indication.
O Security procedures, registration and default bearer establishment as in
ordinary EPS Attach procedure.
O The MME allocates a default LAI, which is configured on the MME and
may take into account the current TAI and/or E-CGI and whether the IMSI
attach is for both CSFB and SMS, or for SMS only. The MME derives a VLR
number based on the allocated LAI and IMSI. The MME starts the location
update procedure towards the new MSC/VLR upon receipt of the subscriber
data from the HSS in step O.
O The MME sends a Location Update Request (new LAI, IMSI, MME IP
address, Location Update Type) message to the VLR.
O The VLR creates an association with the MME by storing MME address.
O The VLR performs Location Updating procedure in CS domain.
O The VLR responds with Location Update Accept (TMSI) to the MME.
O The EPS Attach procedure is completed. Attach Accept message includes
LAI and TMSI. The existence of LAI and TMSI indicates successful attach to
CS domain.
If the UE requests combined EPS/IMSI Attach Request without the
SMS-only indication, and if the network supports only SMS over SGs, the
network performs the IMSI attach and the MME indicates in the Attach
Accept message that the IMSI attach is for SMS only.
11 CSFB and SMSoSGs
305
When the network accepts a combined EPS/IMSI attach without limiting to
SMS-only, the network may provide a CSFB Not Preferred indication to
the UE.
TA/LA TA/LA TA/LA TA/LAu uu update pdate pdate pdateprocedure procedure procedure procedure
The combined TA/LA Update procedure for the CSFB and SMS over SGs in
EPS is realized based on the combined RA/LA Update procedure specified in
earlier for the Gs interface.
new MME MSC/VLR HSS old MME
O UE determines
to perform TAU.
OTAU Request
OSecurity procedures, MME / S-GW reallocation, bearer modification as in ordinary TAU.
OLocation Update Request
O Location Update in CS domain
OLocation Update Accept
OTAU Request
OTAU Complete

Figure 11-8 Combined TA/LA update
O The UE detects a change to a new TA by discovering that its current TAI is
not in the list of TAIs that the UE registered with the network.
O The UE initiates the TAU procedure by sending a TAU Request. The
Update Type indicates that this is a combined Tracking Area/Location Area
Update Request or a combined Tracking Area/Location Area Update with
IMSI attach Request. If the UE needs SMS service but not CSFB, the UE
include an SMS-only indication in the combined TA/LA Update procedure.
O Security procedures, possible MME and S-GW reallocation and bearer
modification as in ordinary EPS TAU procedure.
O If there is an associated VLR in the MM context, the VLR also needs to be
updated. If the association has to be established or if the LA changed, the new
MME sends a Location Update Request (new LAI, IMSI, MME IP address,
Location Update Type) message to the VLR. New LAI is determined in the
MME based on the received GUTI from the UE. If this GUTI is mapped from
LTE/EPS Technology

306
a P-TMSI/RAI, the LAI is retrieved from the GUTI without any modification
by the MME. Otherwise, the MME allocates a default LAI, which is
configured on the MME and may take into account the current TAI or E-CGI
and whether the IMSI attach is for both CSFB and SMS, or for SMS only.
The MME retrieves the corresponding VLR number from the determined
LAI. If multiple MSC/VLRs serve this LAI an IMSI is used to retrieve the
VLR number for the LAI.. The Location Update Type indicates normal
location update.
O The VLR performs Location Update procedure in CS domain.
O The VLR responds with Location Update Accept (TMSI) to the MME.
O The MME sends a TAU Accept (LAI, TMSI) message to the UE. The
TMSI is optional if the VLR has not changed. The presence of the LAI
indicate to the UE that it is IMSI attached. If the UE requests combined
TA/LA Update Request without the SMS-only indication, and if the network
supports SGs for SMS only, the network performs the IMSI attach and the
MME indicates in the TAU Accept message that the IMSI attach is for SMS
only.
O The UE may send a TAU complete message for the TAU procedure if the
LAI/TMSI has been changed.
PeriodicTA/LAupdateprocedure PeriodicTA/LAupdateprocedure PeriodicTA/LAupdateprocedure PeriodicTA/LAupdateprocedure
When the UE is camped on E-UTRAN, periodic LA updates are not
performed, but periodic TA updates are performed. In this case, an SGs
association is established and the MSC/VLR disables implicit detach for
EPS-attached UEs and instead rely on the MME to receive periodic TA
updates.
11 CSFB and SMSoSGs
307
Mobileoriginatingc Mobileoriginatingc Mobileoriginatingc Mobileoriginatingcall all all all
The procedure for MT call is illustrated in Fig. 11-9.
OCM Service Request
OCM Service Reject
OS1AP Request with CSFB ind.
OExtended Service Request
MME MSC SGSN S-GW eNB/BSS/RNS
OOptional Measurement Report solicitation
OPS HO / CCO optionally with NACC / connection release with redirection to GERAN/UTRAN
LA update or combined LA/RA update
if the MSC is changed
and no implicit loc. upd.
OCS call establishment procedure
ORA update (if necessary)

Figure 11-9 MO call
O The UE sends an Extended Service Request (CS Fallback Indicator) to
MME. CS Fallback Indicator indicates MME to perform CS Fallback. The UE
only transmits this request if it is attached to CS domain (with a combined
EPS/IMSI Attach) and can not initiate an IMS voice session (because e.g. the
UE is not IMS registered or IMS voice services are not supported by the
serving IP-CAN, home PLMN or UE).
O The MME sends an S1-AP Request message to eNB that includes a CS
Fallback indicator. This message indicates to the eNB that the UE should be
moved to UTRAN/GERAN.
O The eNB may optionally solicit a measurement report from the UE to
determine the target GERAN/UTRAN cell to which PS handover will be
performed.
O If the UE and the network support inter-RAT handover from E-UTRAN to
GERAN/UTRAN, the eNB triggers PS handover to a GERAN/UTRAN
neighbour cell by sending a Handover Required message to the MME.
LTE/EPS Technology

308
If the UE and the network support inter-RAT Cell Change Order (CCO) to
GERAN and the target cell is GERAN, the eNB triggers an inter-RAT CCO
(optionally with NACC).
If the UE or the network does not support inter-RAT handover from E-
UTRAN to GERAN/UTRAN nor inter-RAT CCO, the eNB triggers
connection release with redirection to GERAN/UTRAN instead of PS HO or
COO.
O The UE establishes CS signalling connection in the target RAT and sends
CM Service Request message. The simultaneous support of packet data
bearers depends on selected RAT and additional features like e.g. DTM.
O In case the MSC serving the 2G/3G target cell is different from the MSC
that served the UE while camped on E-UTRAN, the MSC rejects the service
request, if implicit location update is not performed. The CM Service Reject
triggers the UE to perform a Location Area Update as follows:
If the target system operates in Network Mode of Operation (NMO) I
the UE performs a combined RA/LA update. In this case, the SGSN
establishes a Gs association with the MSC/VLR, which replaces the
SGs association with the MME.
If the target system operates in NMO II or III the UE performs a LA
update towards the MSC. In this case, the MSC releases the SGs
association with the MME.
O The UE initiates the CS call establishment procedure.
O The UE may trigger the RA update procedure when the sending of uplink
packet data is possible.
11 CSFB and SMSoSGs
309
MobileTerminatingCall MobileTerminatingCall MobileTerminatingCall MobileTerminatingCall
The procedure for MT call is illustrated in Fig. 11-10.
OCS page
OIAM
MME MSC SGSN S-GW eNB/BSS/RNS
OExtended Service Request
OS1AP Request /
S1AP Initial UE Context Setup
OOptional Measurement Report solicitation
OPS HO / CCO optionally with NACC / connection release with redirection to GERAN/UTRAN
O LA update or combined LA/RA update
OPaging Response
OConnection Release / Reject
LA update or combined LA/RA update and Roaming Retry for CSFB
if the MSC
is changed
if the MSC
is changed
G CS connection establishment

Figure 11-10 MT call
O The MSC receives an incoming voice call.
O The MME receives a CS Paging (IMSI, VLR TMSI, Location Information,
optional Caller Line Identification)) message from the MSC over a SGs
interface. The TMSI (or IMSI) received from the MSC is used by the MME to
find the S-TMSI which is used as the paging address on the radio interface.
If the UE is in Idle mode the MME pages the UE in all the TAs, the UE is
registered to.
1

In active mode the MME reuses the existing connection to relay the CS Page
to the UE.
The eNB forwards the paging message to the UE. The message contains a
suitable UE Identity (i.e. S-TMSI or IMSI) and a CN Domain indicator and
Caller Line Identification if available and needed.

1
This procedure takes place before step O, immediately after MSC receives MAP_PRN from HSS, if pre-paging is
deployed.
LTE/EPS Technology

310
O The UE establishes an RRC connection or reuses the existing connection to
send an Extended Service Request (CS Fallback Indicator, Reject or Accept)
to MME.
O MME sends S1AP Initial UE Context Setup or S1AP Request message to
eNB that includes CSFB indicator. This message indicates to the eNB that the
UE should be moved to UTRAN/GERAN.
O The eNB may optionally solicit a measurement report from the UE to
determine the target GERAN/UTRAN cell to which PS handover will be
performed.
O If the UE and the network support inter-RAT handover from E-UTRAN to
GERAN/UTRAN, the eNB triggers PS handover to a GERAN/UTRAN
neighbour cell by sending a Handover Required message to the MME.
If the UE and network support inter-RAT Cell Change Order (CCO) to
GERAN and the target cell is GERAN, the eNB triggers an inter-RAT CCO
(optionally with NACC).
If the UE or the network does not support inter-RAT handover from E-
UTRAN to GERAN/UTRAN nor inter-RAT CCO, the eNB triggers
connection release with redirection to GERAN/UTRAN instead of PS HO or
COO.
O If the UE obtains LA/RA information of the new UTRAN/GERAN cell
(e.g. based on the system information or redirection info) and the LA/RA of
the new cell is different from the one stored in the UE, it performs a Location
Area Update or a Combined RA/LA procedure if the target system operates in
NMO I
O The UE establishes CS signalling connection in the target RAT and sends
Paging Response message
2
. The simultaneous support of packet data bearers
depends on selected RAT and additional features like e.g. DTM.
O If the MSC that receives the Paging Response is different from the MSC
that sent the paging request and if the Location Area Update / Combined
RA/LA Update was not performed in step O, the MSC rejects the page
response by releasing the A/Iu-cs connection. The BSC/RNC in turn releases
the signalling connection for CS domain. The signalling connection release
triggers the UE to perform a LA update or Combined RA/LA update.
The LA update triggers the Roaming Retry for CS Fallback procedure,
described in the next section.

2
MSC should be prepared to receive a paging response after a relatively long time from when the CS Paging was
sent. The BSS should be prepared to receive a Paging Response even when the corresponding Paging Request has
not been sent by this BSS.
11 CSFB and SMSoSGs
311
G In case the MSC serving the 2G/3G cell is the same as the MSC that served
the UE while camped on LTE, it shall stop the paging response timer and
establish the CS connection.
MT MT MT MTRoamingRetry RoamingRetry RoamingRetry RoamingRetryCall Call Call Call
MT Roaming Retry Call applies to a MT call while the called mobile is
simultaneously moving from an old to a new MSC, if the GMSC, the HLR
and the old terminating VMSC support the MT Roaming Retry procedure.
In that case, upon receipt of an ISUP IAM message which was preceeded by a
MAP Cancel Location procedure, the old VMSC instructs the GMSC to
resume terminating call procedure by sending a MAP Resume Call Handling
(RCH) message. The GMSC then releases the ISUP connection to the old
VMSC, terminate any open CAP dialogue, and retry the terminating call setup
towards the new MSC by sending an additional SRI to the HLR. This second
SRI request leads to obtaining a roaming number from the new MSC towards
which the call can then be delivered (possibly after new CAMEL
interactions).
The similar procedure is used for Roaming Retry for CS fallback. There are
only two differences in this procedure compared to the Mobile Terminating
Roaming Retry Call procedure described earlier. The first difference is that
the paging message triggers the CS fallback including a location update in the
new RAT. This functionality is already supported in the CS fallback flows for
terminating calls and no additional functionality is needed. The second
difference is that the UE may send a page response message after receiving
Location Update Accept message. The new MSC ignores or rejects the page
response message.
S
e
t
u
p
L
U
P
C
S
F
B
C
S

P
A
G
L
U
P
C
A
N
C
L
O
C P
R
N
SRI
SRI
IAM
R
C
H
IA
M
GMSC
MSC
MSC
MME HSS
IA
M

Figure 11-11 Roaming Retry for CS fallback
LTE/EPS Technology

312
SMS SMS SMS SMS
The procedures for SMS over SGs apply only if the UE is EPS/IMSI attached
and the CS access domain is chosen by the UE and/or the home PLMN for
delivering short messages.
SMS support is based on SGs interface between the MME and the MSC
Server and use of NAS signalling between the UE and the MME, i.e. no CS
Fallback is performed for SMS.
The SMS protocol entities are reused from the existing MS/UE and MSC
2G/3G implementations.
MSC
server
MME E-UTRAN
SMS-IWMSC/
SMS-GMSC
SMS-SC
HSS
SGs
SMS

Figure 11-12 SMS over SGs
12 Acronyms & Abbreviations
313
Acronyms&Abbreviations Acronyms&Abbreviations Acronyms&Abbreviations Acronyms&Abbreviations
16QAM 16 Quadrature Amplitude Modulation
2G 2-nd Generation
3G 3-rd Generation
3GPP TR 3GPP Technical Report
3GPP 3rd Generation Partnership Project
64QAM 64 Quadrature Amplitude Modulation
A/D Analogue-to-Digital
AAA Authentication Authorisation and Accounting
AAS Adaptive Antenna Systems
ACI Adjacent Channel Interference
ACK Acknowledgement
ACM Address Complete Message
ADC Analogue-to-Digital Converter
ADSL Asymmetric Digital Subscriber Line
AES Advanced Encryption Standard
AF Application Function
AGW Access Gateway
AK Anonymity Key
AKA Authentication and Key Agreement
AMBR Aggregate Maximum Bit Rate
AMF Authentication Management Field
AMPS Advanced Mobile Phone System
AMR Adaptive Multi Rate
ANM Answer Message
ANSI American National Standards Institute
APN Access Point Name
ARP Allocation and Retention Priority
ARQ Automatic Repeat Request
AS Application Server
ASK Amplitude Shift keying
AuC Authentication Centre
LTE/EPS Technology

314
AUTN AUthentication TokeN
AV Authentication Vector
BCCH Broadcast Control Channel
BCH Broadcast Channel
BD Billing Database
BER Bit Error Rate
BGCF Breakout Gateway control function
BICC Bearer Independent Call Control
BM-SC Broadcast/Multicast Service Centre
BPSK Binary Phase Shift Keying
BSC Base Station Controller
BSS Base Station System
BSSAP BSS Application Part
BW Bandwidth
C/I Carrier to Interface ratio
CAMEL Customized Applications for Mobile Network Enhanced Logic
CAP Camel Application Part
CATV Cable TeleVision
CC Chase Combining
CC Country Code
CCCH Common Control Channel
CCH Common Control Channel
CCO Cell Change Order
CDMA Code Division Multiple Access
CDR Charging Data Record
CGF Charging Gateway Function
CIC Circuit Identity Code
CK Ciphering Key
CN Core Network
COPS Common Open Policy Service
CP Cyclic Prefix
CPC Continuous Packet Connectivity
CQI Channel Quality Indicator
CRC Cyclic Redundancy Check
CRF Charging Rules Function
CS Circuit Switching
12 Acronyms & Abbreviations
315
CS Convergence Sublayer
CSCF Call Session Control Function
CSFB CS Fallback
CSRN CS domain Routing Number
CTCH Common Traffic Channel
D/A Digital-to-Analogue
DAC Digital-to-Analogue Converter
D-AMPS Digital-Advanced Mobile Phone Service
DBS Digital Broadcast Systems
DC Direct Current
DCCH Dedicated Control Channel
DCH Dedicated Control Channel
DECT Digital Enhanced Cordless Telephony
DFT Discrete Fourier Transform
DHCP Dynamic Host Configuration Protocol
Diffserv Differentiated Services
DL Downlink
DL-PSCH Downlink Physical Shared Channel
DL-SCH Downlink Shared Channel
DM Domain Management
DNS Domain Name System
DPCCH Dedicated Physical Control Channel
DPCH Dedicated Physical Channel
DSL Digital Subscriber Line
DSP Digital Signal Processing
DTCH Dedicated Traffic Channel
DTF Discrete Fourier Transform
DTM Dual Transfer Mode
DwPTS Downlink Pilot Time Slot
EARFCN E-UTRA Absolute Radio Frequency Channel Number
EDGE Enhanced Data Rates for GSM/Global Evolution
EEA EPS Encryption Algorithm
EF Elementary File
eGTP evolved GPRS Tunnelling Protocol
EIA EPS Integrity Algorithm
EIR Equipment Identity Register
LTE/EPS Technology

316
EM Element Management
E-MBMS Enhanced MBMS
EMS Element Management System
eNB Evolved NodeB
ENUM E.164 NUmber Mapping
EPC Evolved Packet Core
ePDG evolved Packet Data Gateway
EPS Evolved Packet System
EPS-AV EPS Authentication Vector
ETSI European Telecommunication Standard Institute
E-UTRAN Evolved UMTS Terrestrial Radio Access Network
EV-DO Evolution Data Only
FACH Forward Access Channel
FDD Frequency Division Duplex
FDMA Frequency Division Multiple Access
FEC Forward Error Correction
FFT Fast Fourier Transform
FIFO First In, First Out
FMC Fixed-Mobile Convergence
FQDN Fully Qualified Domain Name
FSK Frequency Shift keying
FTP File Transfer Protocol
GBR Guaranteed Bit Rate
GERAN GSM/EDGE Radio Access Network
GGSN Gateway GPRS Support Node
GMLC Gateway Mobile Location Center
GMSK Gaussian Minimum Shift Keying
Gn/Gp SGSN-GGSN interface
GPRS General Packet Radio Service
G-Rake Generalized Rake receivers
GRE Generic Routing Encapsulation
GSM Global System for Mobile Communications
GSMA GSM Association
GTP GPRS Tunelling Protocol
GTP-C GTP Control Plane
GTP-U GTP User Plane
12 Acronyms & Abbreviations
317
GUMMEI Globally Unique MME Identifier
GUTI Globally Unique Temporary Identity
HARQ Hybrid Automatic-Repeat Request
HE Home Environment
HLR Home Location Register
HO Handover
hPCRF home PCRF
HPLMN Home Public Land Mobile Network
HSDPA High Speed Downlink Packet Access
HS-DSCH High Speed Downlink Shared Channel
HSPA High Speed Packet Access
HS-PDSCH High Speed Physical Downlink Shared Channel
HSS Home Subscriber Server
HSUPA High Speed Uplink Packet Access
HTTP Hypertext Transfer Protocol
IAM Initial Address Message
IASA IETF Administrative Support Activity
ICI Inter-Cell Interference
I-CSCF Interrogating CSCF
IDMA Interleaved Division Multiple Access
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
iFC initial Filter Criteria
IFFT Inverse Fast Fourier Transform
IK Integrity protection Key
IM Immediate Messages
IMEI International Mobile Equipment Identity
IM-MGW IMS - Media Gateway Function
IMS IP Multimedia Subsystem
IMSI International Mobile Subscriber Identity
IMT International Mobile Telecommunications
INIT Initialisation
IP Internet Protocol
IP-CAN IP Connectivity Access Network
IP-SM-GW IP-Short-Message-Gateway
IR Incremental Redundancy
LTE/EPS Technology

318
ISDN Integrated Services Digital Network
ISI Inter Symbol Interference
ISIM IP Multimedia Services Identity Module
ISR Idle state Signalling Reduction
ISUP ISDN User Part
ITU International Telecommunication Union
IUA ISDN User Adaptation
JCP Java Community Process
K authentication Key
KASME Access Stratum Management Entity Key
KDF Key Derivation Function
KPI Key Performance Indicator
L2 Layer 2
LA Location Area
LCS Location Services
LIA Location-Information-Answer
LIR Location-Information-Request
LO Local Oscillator
LPF Low Pass Filter
LTE Long Term Evolution
LUP Location Update
M2PA MTP2 Pear-to-pear user Adaptation
M2UA MTP2 User Adaptation
M3UA MTP3 User Adaptation
MAC Media Access Control
MAC Message Authentication Code
MAP Mobile Application Part
MBMS Multimedia Broadcast/Multicast Services
MBR Maximum Bit Rate
MBSFN Multimedia Broadcast over a Single Frequency Network
MCC Mobile Country Code
MCCH Multicast Control Channel
MCH Multicast Channel
MEGACO Media Gateway Control Protocol
MGC Media Gateway Controller
MGCF Media Gateway Control Function
12 Acronyms & Abbreviations
319
MGW Media Gateway
MIMO Multiple Input Multiple Output
MIP Mobile IP
MISO Multiple Input Single Output
MME Mobility Management Entity
MMEC MME Code
MMEGI MME Group ID
MMEI MME Identifier
MNC Mobile Network Code
MO Mobile Originated
MO-SMS Mobile Originated SMS
MRF Media Resource Function
MRFC Multimedia Resource Function Controller
MRFP Media Resources Function Processor
MRFP Multimedia Resource Function Processor
MSC Mobile services Switching Centre
MSIN Mobile Station Identification Number
MSISDN Mobile Subscriber Integrated Services Digital Network
MT Mobile Terminated
MTCH Multicast Traffic Channel
MTP Message Transfer Part
MT-SMS Mobile Terminated SMS
MTU Maximum Transfer Unit
MUX Multiplexing/er
NACC Network Assisted Cell Change
NAI Network Access Identifier
NAP Network Attachment Point
NAS Non-access Stratum Signalling
NCC NH Chaining Counter
NDC National Destination Code
NE Network Element
NE Network Entity
NGN Next Generation Network
NH Next Hop
NM Network Management
NMO Network Mode of Operation
LTE/EPS Technology

320
NMS Network Management System
NMT Nordic Mobile Telephone
NRZ Non-Return-to-Zero
O&M Operation & Maintenance
OCS Online Charging System
OFCS Offline Charging System
OFDM Orthogonal Frequency Division Multiplexing
OFDMA Orthogonal Frequency Division Multiple Access
OL Overlaid
OMA Open Mobile Alliance
OPEX OPerating EXpenditure
OPS Open Policy Service
OSS Operation & Support System
PAPR Peak-to-Average Power Ratio
PAR Peak to Average Ratio
PBCH Physical Broadcast Channel
PCC Policy and Charging Control
PCCH Paging Control Channel
P-CCPCH Primary Common Control Physical Channel
PCEF Policy and Charging Enforcement Function
PCFICH Physical Control Format Indicator Channel
PCH Paging Channel
PCI Physical Cell Identity
PCM Pulse Code Modulation
PCRF Policy Control and Charging Rules Function
P-CSCF Proxy CSCF
PDCCH Physical Downlink Control Channel
PDCP Packet Data Convergence Protocol
PDF Policy Decision Function
PDG Packet Data Gateway
PDN Packet Data Network
PDP Packet Data Protocol
PDP Policy Decision Point
PDSCH Physical Downlink Shared Channel
PEA Presence External Agent
PEP Policy Enforcement Point
12 Acronyms & Abbreviations
321
P-GW Packet Data Network Gateway
PHICH Physical Hybrid ARQ Indicator Channel
PHY Physical Layer
PLMN Public Land Mobile Network
PMCH Physical Multicast Channel
PMIP Proxy Mobile IP
PNA Presence Network Agent
PoC Push-to-talk over Cellular
PRACH Physical Random Access Channel
PS Packet Switching
PS Presence Service
PSI Public Service Identity
PSK Phase Shift keying
PSS Packet Streaming Service
PSTN Public Switched Telephone Network
P-TMSI Packet TMSI
PUA Presence User Agent
PUSCH Physical Uplink Shared Channel
QAM Quadrature Amplitude Modulation
QCI QoS Class Identifier
QoS Quality of Service
QPSK Quadrature Phase Shift Keying
RA Routing Area
RACH Random Access Channel
RAN Radio Access Network
RAND RANDom challenge
RAT Radio Access Technology
RAU Routing Area Update
RB Resource Block
RCH Resume Call Handling
RES authentication RESponse
RFC Request For Comments
RLC Radio Link Control
RNC Radio Network Controller
ROHC Robust Header Compression
RRC Radio Resource Control
LTE/EPS Technology

322
RRM Radio Resource Management
RST Reset
RTP Real-time Transport Protocol
RTSP Real Time Streaming Protocol
RTT Round Trip Time
Rx Receiver
S1-AP S1 Application Part
SAA Server-Assignment-Answer
SAE System Architecture Evolution
SAR Server-Assignment-Request
SC Service Center
SCCP Signalling Connection Control Part
S-CCPCH Secondary Common Control Physical Channel
SCF Service Control Function
SC-FDMA Single Carrier Frequency Division Multiple Access
S-CSCF Serving CSCF
SCTP Stream Control Transmission Protocol
SDF Service Data Flows
SDH Synchronous Digital Hierarchy
SDI Session Transfer Identifier
SDMA Space Division Multiple Access
SDP Session Description Protocol
SFN Single Frequency Network
SG Signalling Gateway
SGF Signalling Gateway function
SGs MME-MSC interface
SGsAP SGs Application Part
SGSN Serving GPRS Support Node
S-GW Serving Gateway
SI System Information
SIGTRAN Signalling Transport
SIM Subscriber Identity Module
SIMO Single Input Multiple Output
SIP Session Initiation Protocol
SISO Single Input Single Output
SM Short Message
12 Acronyms & Abbreviations
323
SM Session-based Messaging
SMC Security Mode Command
SMS Short Message Service
SMS-GMSC SMS Gateway MSC
SMS-IWMSC SMS Interworking MSC
SMSoSGs SMS over SGs interface
SMS-SC SMS Service Center
SN Serving Network
SN Subscriber Number
SNR Serial Number
SNR Signal-to-Noise Ratio
SON Self-Organising Network
SQN SeQuence Number
SRI Send Routing Information
SRVCC Single Radio Voice Call Continuity
SS7 Signalling System No. 7
STC Space-Time Coding
STN-SR Session Transfer Number for SRVCC
SUA SCCP User Adaptation
SYN Synchronisation
TA Tracking Area
TAC Tracking Area Code
TAC Type Approval Code
TAI Tracking Area Identity
TAU Tracking Area Update
TCAP Transactions Capabilities Application Part
TCP Transmission Control Protocol
TDD Time Division Duplex
TDM Time Division Multiplexing
TDMA Time Division Multiple Access
TEID Tunnel Endpoint Identifier
TF Transport Format
TFT Traffic Flow Template
TIN Temporary Identity used in Next update
TISPAN Telecoms and Internet converged Services and Protocols for Advanced
Networks
LTE/EPS Technology

324
TMSI Temporary Mobile Subscriber Identity Number
TTI Transmission Time Interval
TX Transmitter
UA User Adaptation
UAA User-Authentication-Answer
UAC User Agent Client
UAL User Adaptation Layer
UAR User-Authentication-Request
UAS User Agent Server
UDI Unrestricted Digital Information
UDP User Datagram Protocol
UE User Equipment
UICC Universal Integrated Circuit Card
UL Underlaid
UL Uplink
UL-PSCH Uplink Physical Shared Channel
UL-SCH Uplink Shared Channel
UMA Unlicensed Mobile Access
UMB Ultra Mobile Broadband
UMTS Universal Mobile Telecommunication System
UP User Plane
UpPTS Uplink Pilot Time Slot
URA UTRAN Registration Area
URI Uniform Resource Identifier
USIM UMTS Subscriber Identity Module
USSD Unstructured Supplementary Service Data
UTRAN UMTS Terrestrial Radio Access Network
V5UA V5 User Adaptation
VCC Voice Call Continuity
VDI VCC Domain Transfer URI
VDN VCC Domain Transfer Number
VLR Visited Location Register
VMSC Visited MSC
VoIP Voice over IP
vPCRF visited PCRF
VPLMN Visited Public Land Mobile Network
12 Acronyms & Abbreviations
325
WAP Wireless Application Protocol
WARC World Administrative Radio Conference
WF Weight Factor
WiFi Wireless Fidelity
WiMAX Worldwide Interoperability Microwave Access
WLAN Wireless Local Access Network
WML Wireless Markup Language
WWW World Wide Web
X2-AP X2 Application Part
XDMS XML Document Management Server
XMAC eXpected Message Authentication Code
XML Extensible Markup Language
XRES eXpected RESponse
LTE/EPS Technology

326
This page is intentionally left blank

You might also like