Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

28) Why we do a Combined Attach?

If the network operates in Network Mode Of Operation I i.e. NMO I and GPRS MS that operates in
Mode A or Mode B will do a simultaneous IMSI attach for GPRS and non GPRS services and shall
use the Combined GPRS attach, combined and periodic routing area updating procedures instead of
the corresponding MM specific procedures IMSI attach and normal and periodic Location area
updating.
29) When UE triggers Event 3A Measurement Report?
Event 3A:The Estimated Quality of currently used UTRAN frequency is below a certain threshold
and the estimated quality of the other system is above a certain threshold.
30) How many transport channels will be configured when a CSV and a PSD call is simultaneously
going on?
Five transport channels will be configured.
1 for 4 SRBs
3 for CSV
1 for PSD
31) When event 2A, 2B, 2C,2E occurs?
Event 2a: Change of best frequency
Event 2b: The estimated quality of the currently used frequency is below a certain threshold and the
estimated quailty of a non-used frequency is above a certain threshold.
Event 2c: The estimated quality of a non-used frequency is above a certain threshold
Event 2d: The estimated quality of the currently used frequency is below a certain threshold
Event 2e: The estimated quality of a non-used frequency is below a certain threshold
32) When event 1A 1F Event occurs?
event 1A: A Primary CPICH enters the reporting range
event 1B: A primary CPICH leaves the reporting range
event 1C: A non-active primary CPICH becomes better than an active primary CPICH
event 1D: Change of best cell
event 1E: A Primary CPICH becomes better than an absolute threshold
event 1F: A Primary CPICH becomes worse than an absolute threshold
33) Where CK and IK gets generated?
In RRC CK and IK gets generated.
34) Where CK and IK gets stored?
In USIM CK and IK will get stored.
35) Where the Security procedure will start?
Security Procedure will start in RRC but Ciphering will start for AM and UM data security procedure
will start at RLC layer. And for TM mode security procedure start at MAC layer.
36) What are the mandatory SIBs which UE has to read before
campign
campaign?

SIB 1, 3,5,7,11
37) What are the important RACH parameters and which SIB contains this information?
SIB 7/5
38) Which SIB contains S criteria information?
SIB 3

You might also like