LTE - Signaling & Protocol Analysis
(Vol.1 RAN and UE)
[3-day course, Euro 3,450.- (net) per participant]
Revisiting important Details of the EPS
- Architecture Overview
- Evolved Packet Core in Context
- EPC vs. EPS, Non-3GPP Access Networks (trusted / non-trusted)
- EPC vs. EPS, Non-3GPP Access Networks (trusted / non-trusted)
- Zoom into the EPS
- Functional Overview of Core Network Elements within the EPC)
- Functional Overview of Core Network Elements within the EPC)
- Network Elements and their Functions within the EPC
- Mobility Management Entity (MME) (Characteristics (Identification), Interfaces & Protocols, Tasks & Functions of the MME), Serving Gateway (S-GW) (Characteristics (Identification), Interfaces & Protocols, Tasks & Functions of the S-GW), PDN Gateway (P-GW or PDN-GW) (Characteristics (Identification), Interfaces & Protocols, Tasks & Functions of the P-GW), enhanced Packet Data Gateway (ePDG) (Characteristics (Identification), Interfaces & Protocols, Tasks & Functions of the ePDG)
- Mobility Management Entity (MME) (Characteristics (Identification), Interfaces & Protocols, Tasks & Functions of the MME), Serving Gateway (S-GW) (Characteristics (Identification), Interfaces & Protocols, Tasks & Functions of the S-GW), PDN Gateway (P-GW or PDN-GW) (Characteristics (Identification), Interfaces & Protocols, Tasks & Functions of the P-GW), enhanced Packet Data Gateway (ePDG) (Characteristics (Identification), Interfaces & Protocols, Tasks & Functions of the ePDG)
- Evolved Packet Core in Context
- Protocol Stacks
- Control Plane / E-UTRAN - EPC
- User Plane E-UTRAN – EPC (S5/S8 GTP-based)
- User Plane E-UTRAN – EPC (S5/S8 PMIPv6/GRE-based)
- Control Plane / E-UTRAN - EPC
- Security Architecture
- Overview & Introduction
- Essentials, EPS-AKA, Security is performed independently in two protocol layers, Algorithms)
- Essentials, EPS-AKA, Security is performed independently in two protocol layers, Algorithms)
- Operation of UMTS-AKA
- Key Derivation Function (KDF)
- Comprehension Check & Practical Exercise:
The KDF S(10) for K(ASME) (Input Parameters)
- Comprehension Check & Practical Exercise:
- EPS-AKA in Operation during Initial Attach Procedure
- Use of the different Security Algorithms
- Overview & Introduction
The Non-Access-Stratum: EMM & ESM
- Important EMM-Procedures
- Common Procedures, Specific Procedures, Connection Management Procedures)
- Common Procedures, Specific Procedures, Connection Management Procedures)
- State Machine
- Relationship between EMM and ECM)
- Relationship between EMM and ECM)
- Network Operation Modes
- Message Format
- Security Header
- Security Header
- Important EMM-Scenarios
- Attachment through E-UTRAN / new MME, Comprehension Check & Practical Exercise: Building your own EMM: ATT_REQ-Message, Tracking Area Update (Inter-MME / with new S-GW) (Initial Conditions, Detailed Description), Comprehension Check & Practical Exercise: EMM-Message Decode
- Attachment through E-UTRAN / new MME, Comprehension Check & Practical Exercise: Building your own EMM: ATT_REQ-Message, Tracking Area Update (Inter-MME / with new S-GW) (Initial Conditions, Detailed Description), Comprehension Check & Practical Exercise: EMM-Message Decode
- Important ESM-Procedures
- MME-initiated, UE-initiated
- MME-initiated, UE-initiated
- State Machine
- Message Format
- Security Header, Procedure Transaction Identity)
- Security Header, Procedure Transaction Identity)
- Dedicated EPS Bearer Establishment
- Network Initiated (IMS triggered during Call Establishment) (Initial Conditions, Detailed Description, Detailed Description)
Radio Resource Control
- Overview
- Transmission of broadcast information, Establish and maintain services, QoS control, Transfer of dedicated control information)
- Transmission of broadcast information, Establish and maintain services, QoS control, Transfer of dedicated control information)
- State Characteristics of RRC
- RRC_IDLE, RRC_CONNECTED)
- RRC_IDLE, RRC_CONNECTED)
- Signaling Radio Bearers (SRB)
- Overview
- SRB0, SRB1, SRB2
- SRB0, SRB1, SRB2
- Mapping of RRC-Messages to SRB's and to Channels
- Messages on BCCH (MIB and SIB), Messages on PCCH and DL-CCCH, Messages on DL-DCCH and DL-DTCH, Messages on UL-CCCH, UL-DCCH and UL-DTCH
- Messages on BCCH (MIB and SIB), Messages on PCCH and DL-CCCH, Messages on DL-DCCH and DL-DTCH, Messages on UL-CCCH, UL-DCCH and UL-DTCH
- Overview
- Message Encoding through ASN.1 PER-unaligned
- Example: The ASN.1-Code of RRC_CONN_REQ ...
- … and the compiled Message Structure (Tree View)
- Important Encoding Rules of ASN.1 PER-unaligned
- Handling of optional IE's, Selection among Options (CHOICE / ENUMERATED), Handling of IE's with variable Length
- Handling of optional IE's, Selection among Options (CHOICE / ENUMERATED), Handling of IE's with variable Length
- Comprehension Check & Practical Exercise:
- Encoding an RRC_CONN_REQ-Message
- Encoding an RRC_CONN_REQ-Message
- System Information Broadcast
- Overview, Example of an MIB, Example of an SIB1, Example of an SIB2, Example of an SIB3
- Example: The ASN.1-Code of RRC_CONN_REQ ...
Lower Layers of the Uu-Interface: MAC, RLC & PDCP
- Features of MAC
- Overview
- Data transfer logical channels ←→ transport channels, Radio resource allocation)
- Data transfer logical channels ←→ transport channels, Radio resource allocation)
- MAC Random Access Procedure
- Contention based random access procedure, Non-contention based random access procedure)
- Contention based random access procedure, Non-contention based random access procedure)
- Structure of MAC-PDU
- MAC control element, Normal MAC SDU
- MAC control element, Normal MAC SDU
- MAC Control Elements
- Contention resolution ID, Timing Advance, DRX, Padding, Short, long and truncated buffer status reports
- Contention resolution ID, Timing Advance, DRX, Padding, Short, long and truncated buffer status reports
- Overview
- Features of RLC
- Overview
- Data transfer, Error detection and recovery, Reset)
- Data transfer, Error detection and recovery, Reset)
- Structure of RLC PDU
- Structure of RLC AM with PDCP PDU Segments
- Overview
- Features of PDCP
- Overview
- RoHC, Numbering of PDCP PDU’s, In-sequence delivery of PDU’s, Duplicate deletion, Encryption, Integrity Protection)
- RoHC, Numbering of PDCP PDU’s, In-sequence delivery of PDU’s, Duplicate deletion, Encryption, Integrity Protection)
- Structure of PDCP PDU
- Overview
X2- and S1-Interfaces: X2AP- and S1-AP-Protocols
- The X2AP Protocol
- Protocol Stack on the X2-interface
- Tasks & Functions
- Mobility Management, Load Management, X2-Interface Management)
- Mobility Management, Load Management, X2-Interface Management)
- X2-based Handover Scenario
- Initial Conditions, Detailed Description)
- Initial Conditions, Detailed Description)
- Protocol Stack on the X2-interface
- The S1-AP Protocol
- Overview & Introduction
- S1-based Handover Scenario
- Overview & Introduction
v1.000
Search:
Advanced SearchMore Info:
General Information about this course
Schedule of this training course
Buy this book
Buy this book as eBook
INACON eBooks
Please have a look at our full offer