Radio Link Control Packet Analysis

Radio Link Control Packet Analysis

RLC typically be any data type e.g. Programming language C ,which decide the length, size, type of information dependent on situation or requirements.

So Let's Explore RLC like never done before.

Architecture 

No alt text provided for this image

What is SDU & PDU?

Service Data Unit: A unit of data passed down in a Protocol stack from Upper layer to lower layer. Efficiently called as ‘Payload’.

Protocol Data Unit: A protocol specific control information with specified headers and associated detailing along with Payload.

 So the below given segment will see how to deal with Payload size and different types of PDU formats as per given architecture.

No alt text provided for this image


RLC Analysis is the focus so all the given references below will be towards the same direction.




1st step : Signaling Packets

During call processing we have to validate the status packets & statistics for signaling data.

Let's First start discuss about Downlink

RLC Configured with SRB1: Post to RRC Connection setup the RLC DL config confirms the activation for SRB -1/AM mode 

No alt text provided for this image
No alt text provided for this image
No alt text provided for this image

The RLC RB info packet confirms the configurations presented at RRC Connection setup.

As the AM mode information is just initialized and in RRC Setup we use TM mode, the RLC Statistics will be as mentioned.

No alt text provided for this image

As we move on towards Attach/Signaling process

No alt text provided for this image

The above given I have taken example for two DL SRB Packets sent to UE

1. RRC DL Information Transfer >>{Piggybacked NAS info: Identity Request }

2. RRC DL Information Transfer >> {Piggybacked NAS info :Authentication Request }

Do write down in comment section why we need Identity Request ....


As the data carried by SRB 1,Surely will have the RLC Data for the given information.

No alt text provided for this image

So same as follows for the

3. RRC DL Information Transfer >>{Piggyback NAS Info: Security Mode Command}

No alt text provided for this image

and So on for the rest of the signaling.

No alt text provided for this image
No alt text provided for this image



With above picture Follow the call flow too....



As we reach to the part of call flow where we get the RRC Connection Reconfiguration

We get to establish with new SRB-2 & DRB-ID :depends upon ASN.1

To know more play around with the given website. Click here:ASN.1

With RLC configuration we can clearly see the activation for SRB-2 & DRB respectively.

No alt text provided for this image

So from here the complexity and fun arises.

We will see 3 different information data mapped to 3 different ID's at difference instances

which may can increase in number as we are establishing new DRB for different QCI's

The best way to map is to follow the RB config-Idx.

No alt text provided for this image
Here Comes the Uplink


No alt text provided for this image

Quick checks are Uplink Configuration and UL packet stats.

No alt text provided for this image

above given is SRB1 Establishment and below given is so on for SRB2,DRB and so on..

No alt text provided for this image

whereas UL Stats are mandatory too . Below given for UL Data during SRB1 only

No alt text provided for this image

For SRB-2, DRB-1 uplink stats

No alt text provided for this image

With the given logs and detailing is just basic part of RLC analysis been covered for signaling .

RLC type , Debugging the RLC with data packets will be covered with next Blog.

No alt text provided for this image


And for the beginners have attached the call flow . Click here: Call-flow


Will comeback with more exclusive log analysis content soon till then be positive!!

See yeah!!

sandeep goel

Technical Leader IODT

4 年

Well explained ??

Satya Agarwal

5G NR SA | NSA | Slicing | MuMIMO | LTE | O-RAN | Kubernetes | Virtualization | gNB Log Analysis | RAN Testing | QXDM | E500 | Simnovus | c/u plane design & debugging

4 年

Very nicely explained with detailed content. Keep posting please such amazing technical posts, really helpful to us.

piash halder

BSS & Rf engineer at Vodafone Idea Limited

4 年

Thank you sir for sharing

Abhishek Kr. Jain

5G | SA | PHY & MAC Log Analysis | O-RAN | RRC | HandOver | CA | Linux | Python & Shell Scripting

4 年

Hi Suraj, Thank you for this amazing content in such a systematic manner, and I would like to put my thoughts on "Identity Request" UE sends IMSI/TMSI + IMEI + Transport index to get it (USIM+ME) identified by the network In 4G, authentication happens both the ways and for that transport index is used. 1) Two values (Random value & response) shared by network to UE depends upon these all 3 identities only. 2) To know if USIM belongs to that network? 3) To understand what are the keys associated with that UE (USIM particularly) 4) To ultimately proceed for authentication and encryption of the data specific for that UE. When this identity request is sent? 1) After GUTI mismatch 2) After OOC / Radio link failure

Praveen Shukla

Senior Member Of Technical Staff at Altiostar Networks, Inc. 5G/4G RAN Professional | 4G/5G Log Analysis | Microservice | Kubernetes | Docker | QA

4 年

Very detailed presentation and I find it intersecting reading your blog ??. I think you should shart writing this kind of blog in different way??. Thanks for sharing!

要查看或添加评论,请登录

Suraj Kumar的更多文章

社区洞察

其他会员也浏览了