You are on page 1of 24

LTE Procedures

BY:
ENG. Waleed Elsafoury

Copyright © 2014 Waleed Elsafoury


LTE Procedures

• LTE Procedures
• ACCESS PROCEDURES
• POWER CONTROL
• MOBILITY MANAGEMENT PROCEDURES
• SECURITY PROCEDURES

• LTE – Advanced introduction


LTE Procedures

• Access Procedures
• CELL SEARCH

• RANDOM ACCESS

• PAGING
LTE Procedures

• Cell Search
• Primary Synch.
• Secondary Synch.
• Broadcast reading
LTE Procedures

• Random Access
LTE Procedures

• Paging
120 msec
LTE Procedures

• Power control
LTE power control requirements are less stringent than for WCDMA.
• Slow UL power control combines two components:
• Open loop power control calculated at the UE
• Closed loop power control corrections transmitted by the eNodeB
• Slow DL closed loop power control
LTE Procedures

• Mobility Management
• TRACKING AREA UPDATE

• HANDOVER
LTE Procedures

• Tracking Area Update


• In the same MME
• In Different MMEs
LTE Procedures

• Handover No soft / softer HO


LTE Procedures

• Handover
LTE Procedures

• Handover
LTE Procedures

• Security
• USER DOMAIN
• MS & SIM SECURITY
• APPLICATION DOMAIN
• APPLICATION SECURITY ( BB SERVICE )
• NETWORK DOMAIN
• P-GW
• NETWORK ACCESS
• AUTHENTICATION
• CIPHERING
• INTEGRITY CHECK
• IMEI CHECK
LTE Procedures

Database
SQN Generator RAND Generator
(IMSI;K)
AMF
Authentication
SQN Management K RAND
Sequence Number Field secret Key Random Number

f1 f2 f3 f4 f5

MAC XRES
Message Authentication Expected Response
CK IK AK
Code Cipher Key Integrity Key Anonymity Key
 User
 Network Authentication  Ciphering  Integrity  SQN Anonymity
Authentication

RAND XRES CK IK AUTN


AV = Random number Expected Response Cipher Key Integrity Key Authentication Token

SQN  AK AMF MAC


48 bit 16 bit 64 bit
LTE Procedures

USIM Authentication Request


[RAND(i), AUTN(i)] MME
Generate:
· RES Authentication Response
· XMAC [RES(i)] Compare:
· CK or Authentication Reject · XRES(i) = RES(i) ?
· IK [XMAC  MAC]  User Authentication

K RAND SQN  AK AMF MAC AUTN

f5 AK 
SQN

f4 f3 f2 f1

IK CK RES XMAC

Integrity Ciphering to network XMAC = MAC ?


Check  User  Network
Authentication Authentication
LTE Procedures

• Ciphering
LTE Procedures

• Integrity Check

Check SUM Check SUM


LTE - Advanced

• LTE Advanced

•Carrier BW=100Mhz
•Asymmetric bandwidth assignment for FDD
•SONs, Self Organizing Networks methodologies
•Carrier aggregation
•Femto Cells
•Relays
•COMP “Coordinated multipoint”
•Cognitive radio
•D2D
LTE - Advanced

Carrier aggregation
LTE - Advanced

COMP “Coordinated multipoint”


LTE - Advanced

Device to Device Communications


LTE - Advanced

Relays
LTE - Advanced

Femto Cells
LTE - Advanced

Cognitive radio

You might also like