Professional Documents
Culture Documents
6-CH 5
6-CH 5
BY:
ENG. Waleed Elsafoury
• LTE Procedures
• ACCESS PROCEDURES
• POWER CONTROL
• MOBILITY MANAGEMENT PROCEDURES
• SECURITY PROCEDURES
• Access Procedures
• CELL SEARCH
• RANDOM ACCESS
• PAGING
LTE Procedures
• Cell Search
• Primary Synch.
• Secondary Synch.
• Broadcast reading
LTE Procedures
• Random Access
LTE Procedures
• Paging
120 msec
LTE Procedures
• Power control
LTE power control requirements are less stringent than for WCDMA.
• Slow UL power control combines two components:
• Open loop power control calculated at the UE
• Closed loop power control corrections transmitted by the eNodeB
• Slow DL closed loop power control
LTE Procedures
• Mobility Management
• TRACKING AREA UPDATE
• HANDOVER
LTE Procedures
• Handover
LTE Procedures
• Handover
LTE Procedures
• Security
• USER DOMAIN
• MS & SIM SECURITY
• APPLICATION DOMAIN
• APPLICATION SECURITY ( BB SERVICE )
• NETWORK DOMAIN
• P-GW
• NETWORK ACCESS
• AUTHENTICATION
• CIPHERING
• INTEGRITY CHECK
• IMEI CHECK
LTE Procedures
Database
SQN Generator RAND Generator
(IMSI;K)
AMF
Authentication
SQN Management K RAND
Sequence Number Field secret Key Random Number
f1 f2 f3 f4 f5
MAC XRES
Message Authentication Expected Response
CK IK AK
Code Cipher Key Integrity Key Anonymity Key
User
Network Authentication Ciphering Integrity SQN Anonymity
Authentication
f5 AK
SQN
f4 f3 f2 f1
IK CK RES XMAC
• Ciphering
LTE Procedures
• Integrity Check
• LTE Advanced
•Carrier BW=100Mhz
•Asymmetric bandwidth assignment for FDD
•SONs, Self Organizing Networks methodologies
•Carrier aggregation
•Femto Cells
•Relays
•COMP “Coordinated multipoint”
•Cognitive radio
•D2D
LTE - Advanced
Carrier aggregation
LTE - Advanced
Relays
LTE - Advanced
Femto Cells
LTE - Advanced
Cognitive radio