tech-invite   World Map     

IETF     RFCs     Groups     SIP     ABNFs    |    3GPP     Specs     Glossaries     Architecture     IMS     UICC    |    search

Top          in Index          Prev          Next

TS 36.425 (RAN3)
E-UTRAN – X2 interface user plane protocol

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.0    2017/03    19 p.
(P) V13.1    2016/09    19 p.
(P) V12.1    2015/03    17 p.

Rapporteur:  Mr. Vesely, Alexander
See also:  –

The X2 user plane (X2 UP) protocol is located in the User Plane of the Radio Network layer over the X2 interface. The X2 UP protocol is used to convey control information related to the user data flow management of E-RABs.

X2-UP in X2 User Plane protocol stack

Each X2 UP protocol instance is associated to one E-RAB only.

This version of the present document defines the X2 UP protocol in the context of dual connectivity only, more specifically, only for X2 user data bearers setup for E-RABs configured with the split bearer option.

If configured, X2 UP protocol instances exist at the eNBs between which the X2 user data bearers are setup, specifically for dual connectivity between the MeNB and the SeNB.

NOTE: X2 user data bearers may be setup for data forwarding purposes during X2 HO or during DC related mobility, however, these X2 user data bearers do not require the execution of any additional E-RAB related UP protocol functions related to an X2 UP protocol instance.

In this version of the present document, X2 UP protocol data is conveyed by GTP-U protocol means, more specifically, by means of the "RAN Container" GTP-U extension header as defined in TS 29.281.


Here          Top



1   Scope [R12]   PDF-p. 5
2   References [R12]
3   Definitions, symbols and abbreviations [R12]
4   General [R12]   PDF-p. 6
5   X2 user plane protocol [R12]   PDF-p. 7
5.1   General
5.2   X2 user plane protocol layer services
5.3   Services expected from the X2 Transport Network Layer      Up
5.4   Elementary procedures   PDF-p. 8
5.5   Elements for the X2 user plane protocol   PDF-p. 10
5.6   Handling of unknown, unforeseen and erroneous protocol data
A   Change history   PDF-p. 17

Up          Top