Professional Documents
Culture Documents
P
c
ch
: channelization code
c
scramb
: scrambling code
p(t): pulse-shaping filter (root raised cosine, roll-off 0.22)
Figure 11: Downlink spreading, scrambling and modulation
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 23/208
2.6 User detection mechanisms (quick overview)
In Figure 12 the proposed multi user detection ,mechanisms for the UTRA system are shown. Today
only the single user detection (SUD) is implemented in the Node Bs. This is due to the huge
calculation capacity required for performing multi user detection. More information about user
detection mechanisms can be found in [UTRA].
Single User Detection
(SUD)
Interference Cancellation
(IC)
Joint Detection
(JD)
Multi User Detection
(MUD)
CDMA Receiver
Figure 12: Possible multi user detection mechanisms in the UTRA system
2.7 Power Control in UMTS FDD
Find detailed information on power control in [25.214]. Summary in [WFI] or [INTRO]. This chapter
is in accordance with [SysDesign]. This chapter is divided into 3 parts:
General Power Control
Uplink PC
Downlink PC
2.7.1 General Power Control in UMTS
Evaluation of measurement reports and sending of power control commands is done by the serving
radio network controller SRNC.
Unlike in GSM, the power control mechanism in UMTS is not based on selecting appropriate power
levels to be used in the transmitter. Instead, the power control mechanism is based on a quality level
(the Signal to Interference Ratio) that has to be achieved by transmitting with an appropriate power
level.
CDMA is very sensitive for what concerns power control: for the proper functioning of UMTS, it is of
vital importance to have a good power control mechanism: the signal to interference ratio (SIR) has
to be kept at a certain level. If the SIR is too low, the signal of a UE can not be de-spreaded and
reconstructed any more. Since all users are transmitting simultaneously, the noise level depends
(among others) on the number of users.
-> The more interference, the more a cell is congested
This means that interference (transmit power of other links) determines the usage and thus
availability of free radio resources. A good power control algorithm will optimize the usage of radio
resources and thus increase the availability of radio resources.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 24/208
Another very important goal (maybe the most important goal) of power control is to maintain the
signal quality on a radio link. Once a radio link has been established, we try to maintain it.
There are 2 types of power control:
- power control for common channels: Open Loop Power control
- power control for dedicated channels DPCCH/DPDCH and downlink shared channel DSCH:
Closed Loop Power control
Closed loop power control is intended to reduce interference in the system by maintaining the
quality of a UE-UTRAN communication (i.e. radio link) as close as possible to the minimum quality
required for the type of service requested by the user. Closed loop power control is relevant for the
physical layer channels that support dedicated transport channels (DCH) and for those that support
shared transport channels (DSCH).
Closed loop power control consists of two parts an inner loop and outer loop. This chapter is
divided into subsections related to outer loop and inner loop power control for dedicated channels
followed by open loop power control for common channels.
2.7.1.1 Outer Loop Power Control
The parameter used by layer 1 for making inner loop power control decisions are determined by the
outer loop power control algorithm. The outer loop control function manages the inner loop process
by setting the SIR target parameter and the power up/down step sizes.
In general, the algorithm for generating the TPC bits can be described with the following rules:
SIR
est
>= SIR
target
TPC command = power down one step
SIR
est
< SIR
target
TPC command = power up one step
The frequency of the outer loop power control is typically in the range of 10 100 Hz.
2.7.1.2 Inner Loop Power Cont rol for dedicated channels
The inner part of closed loop power control is also called fast power control (1500 Hz) since it is
intended to respond to fast variations in propagation characteristics of the radio link (e.g. fast fading
at slow or medium speeds) as well as rapidly changing interference conditions. The power control
loop is closed because the receiver of the radio signal communicates commands back to the sender
to adjust its transmitted power. Fast power control is considered to be part of the physical layer of
the UTRA and is performed in the Node B and the UE.
The structure of the air interface enables power control commands called Transmit Power Control
(TPC) command bits to be sent once per slot. TPC bits can tell the remote end of the loop to either
power up by a step or to power down by a step. The decision to power up or down is based on an
estimate of the signal to interference ratio (SIR) of the channel. Since SIR is related to the quality of
the radio link, the principle of managing the quality of the link is achieved.
As closed loop power control is slightly different for UL and DL, more details are given in chapters
2.7.1.2.1 for uplink and 2.7.1.2.2 for downlink.
2.7.1.2.1 Uplink closed loop power control
Uplink power control in a CDMA system is very important because of the necessity of suppressing
the near-far effect. Assuming all mobiles transmitting with the same power, a mobile close the
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 25/208
receiver (Node B) would interfere the signal received from a mobile at the cell edge very strong,
while the mobile at the cell edge doesnt interfere the one close to the Node B. This effect is harming
all communications of mobiles having another mobile between themselves and the Node B. This is
the so called Near-Far-Effect.
The uplink inner-loop power control adjusts the UE transmit power in order to keep the received
uplink signal-to-interference ratio (SIR) at a given SIR target.
The serving cells (cells in the active set) estimate signal-to-interference ratio SIRest of the received
uplink DPCH. TPC commands are generated in the serving cells and transmitted once per slot
according to the following rule:
- SIRest > SIRtarget then the TPC command to transmit is "0"
- SIRest < SIRtarget then the TPC command to transmit is "1"
Upon reception of one or more TPC commands in a slot, the UE derives a single TPC command
(TPC_cmd) for each slot, combining multiple TPC commands if more than one is received in a slot.
Two algorithms are supported by the UE for deriving a TPC_cmd. Which of these two algorithms is
used is determined by a UE-specific higher-layer parameter, "PowerControlAlgorithm", and is under
the control of the UTRAN. If "PowerControlAlgorithm" indicates "algorithm1", then the layer 1
parameter PCA shall take the value 1 and if "PowerControlAlgorithm" indicates "algorithm2" then
PCA shall take the value 2.
If PCA has the value 1, Algorithm 1 shall be used for processing TPC commands.
If PCA has the value 2, Algorithm 2 shall be used for processing TPC commands.
(Algorithm 1 and 2 are described in section 5.1.2.2.2 and 5.1.2.2.3 in 3GPP TS25.214 V3.3.0.)
The step size ATPC is a layer 1 parameter which is derived from the UE-specific higher-layer
parameter "TPC-StepSize" which is under the control of the UTRAN. If "TPC-StepSize" has the value
"dB1", then the layer 1 parameter ATPC shall take the value 1 dB and if "TPC-StepSize" has the value
"dB2", then ATPC shall take the value 2 dB. The step size for the UL power control is thus 1 or 2 dB.
After deriving of the combined TPC command TPC_cmd using one of the two supported algorithms,
the UE shall adjust the transmit power of the uplink DPCCH with a step of DPCCH (in dB) which is
given by:
DPCCH = ATPC*ATPC_cmd.
Node B
Outer loop
Open loop
Inner loop
Closed Loop = Inner Loop + Outer Loop
Figure 13: Different UL power control mechanisms
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 26/208
2.7.1.2.2 Downlink closed loop power control
In Downlink both the inner and outer loop of the closed loop power control are performed in the
UE. The UE generates TPC commands to control the network transmit power and send them in the
TPC field of the uplink DPCCH. The UE checks the downlink power control mode (DPC_MODE)
before generating the TPC command:
DPC_MODE = 0: The UE sends a unique TPC command in each slot and the TPC command
generated is transmitted in the first available TPC field in the uplink DPCCH
DPC_MODE = 1: The UE repeats the same TPC command over 3 slots and the new TPC
command is transmitted such that there is a new command at the beginning of
the frame. This mode is also called Slow Power control. Its advantage is a
higher precision of the TPC command.
Note: DPC_MODE=1 shall not be used in 3GR1.1 because 3GPP specs are not finalized.
The DPC_MODE parameter is a UE specific parameter controlled by the UTRAN.
The power control step size ATPC can take four values: 0.5, 1, 1.5 or 2 dB. It is mandatory for
UTRAN to support ATPC of 1 dB, while support of other step sizes is optional.
In case of congestion (commanded power not available), UTRAN may disregard the TPC commands
from the UE.
2.7.1.3 Open Loop Power Control
The open loop power control is relevant for physical channels that support common transport
channels. In the definition of TS 25.214 V3.3.0 this is the UL PRACH. This physical channel is used
by the UE for establishing a connection to the network or sending small amounts of data. The Open
Loop Power control consists in setting the transmit power by measuring the path loss of the direct
link and adding the interference level of the node B and a constant value.
Method:
On the BCCH, the node-B will indicate the transmit power of the PCCPCH (and also the required
SIR). By measuring the received power-level, the UE can find the downlink pathloss including fading.
From this path loss estimation and the knowledge of the uplink interference level and the required
SIR, the transmit power needed on the PRACH channel can be determined.
2.7.1.4 Site selection diversity transmit power control
Site selection diversity transmit power control (SSDT) is another macro diversity method in soft
handover mode. This method is optional in UTRAN.
Operation is summarized as follows. The UE selects one of the cells from its active set to be
primary, all other cells are classed as non primary. The main objective is to transmit on the
downlink from the primary cell, thus reducing the interference caused by multiple transmissions in a
soft handover mode. A second objective is to achieve fast site selection without network intervention,
thus maintaining the advantage of the soft handover. In order to select a primary cell, each cell is
assigned a temporary identification (ID) and UE periodically informs a primary cell ID to the
connecting cells. The non-primary cells selected by UE switch off the transmission power. The
primary cell ID is delivered by UE to the active cells via uplink FBI field. SSDT activation, SSDT
termination and ID assignment are all carried out by higher layer signaling
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 27/208
2.8 HO types & events
Definition: The list of cells involved in the soft/softer HO is called Active Set. The maximum size of
the active set can be defined.
2.8.1 Hard handover
The hard handover (HO) is comparable to the HO procedure of GSM. The mobile is always
connected to only one base station (Node B). When performing the HO to another Node B, the
connection to the former Node B is released.
All connections using a FACH channel (Fast Allocation CHannel, without power control and only for
short packages) or a DSCH (Downlink Shared CHannel, best channel for packet switched services)
must use the hard HO. They can not benefit from soft HO gains.
Other hard HO:
Inter-system HO between e.g. UTRA and GSM
Inter-frequency HO between different UTRA carriers
Within 3GR1.1 no compressed mode is possible, which is necessary for hard handover. Hard
handover and support of DSCH are not included in 3GR1.1. This release is also not offering Inter-
RNC cell reselection in idle mode.
2.8.2 Soft handover
Packet switched communications using a DCH channel and all circuit switched communications are
able to perform a soft HO. Soft HO means, that the mobile receives the same signal from more
than one Node B and its transmitted signal is processed by more than one Node B. The number of
Node Bs to which the UE is connected is called the Active Set. This is increasing the number of
received multipaths in UL and DL and thus is leading to diversity gain (see chapter 2.8.4). If a Node
B is put into the active set of a mobile is depending on the pilot E
c
/I
0
. The general scheme of SHO
can be seen in Figure 14.
For the description of the exemplary Soft Handover algorithm presented in this section the following
parameters are used (AS means Active Set):
AS_Th
Threshold for macro diversity (max difference for best signal in AS and candidate signal)
AS_Th_Hyst
Hysteresis for the above threshold AS_Th
AS_Rep_Hyst
Replacement Hysteresis
,T
Time to Trigger
AS_Max_Size
Maximum size of Active Set
The following figure describes this Soft Handover Algorithm.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 28/208
AS_Th AS_Th_Hyst
As_Rep_Hyst
As_Th + As_Th_Hyst
Cell 1 Connected
Event 1A
Add Cell 2
Event 1C
Replace Cell 1 with Cell 3
Event 1B
Remove Cell 3
CPICH 1
CPICH 2
CPICH 3
Time
Measurement
Quantity
,T ,T ,T
Figure 14: Example of SHO algorithm
As described in the figure above:
If Meas_Sign is below (Best_Ss - As_Th - As_Th_Hyst) for a period of ,T remove Worst cell in
the Active Set.
If Meas_Sign is greater than (Best_Ss - As_Th + As_Th_Hyst) for a period of ,T and the Active
Set is not full add Best cell outside the Active Set in the Active Set.
If Active Set is full and Best_Cand_Ss is greater than (Worst_Old_Ss + As_Rep_Hyst) for a
period of ,T add Best cell outside Active Set and Remove Worst cell in the Active Set.
Where:
Best_Ss the best measured cell present in the Active Set
Worst_Old_Ss the worst measured cell present in the Active Set
Best_Cand_Set the best measured cell present in the monitored set
Meas_Sign the measured and filtered signal
In Figure 14 three different reporting events are used (1A, 1B, 1C). All standardized triggering
events are given in chapter 2.8.5.
An example for a possible SHO algorithm is given hereafter:
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 29/208
Meas_Sign > Best_Ss
As_Th
as_Th_Hyst
for a period of , ,, ,T
Yes
No
(Event 1B)
Remove Worst_Bs in
the Active Set
Meas_Sign > Best_Ss As_Th
+ as_Th_Hyst
for a period of , ,, ,T
No
Yes
(Event 1A)
Add Best_Bs in the Active
Set
Best_Cand_Ss > Worst_Old_Ss +
As_Rep_Hyst
for a period of , ,, ,T
Yes
(Event 1C)
No
Active Set Full
No
Yes
Add Best BS in Active
Set and Remove Worst
Bs from th Active Set
Begin
Figure 15: Flowchart of an simple SHO algorithm
2.8.3 Softer handover
A softer HO is a soft HO between cells of the same Node B, thus sectors of the same site. As this is
not improving the multipath conditions as much as soft HO does, the diversity gain is smaller.
2.8.4 Power control in soft(er) handover
In SHO, the UE has established more than one radio link. This requires special power control
functionality to identify the correct power control command.
2.8.4.1 Downlink PC in SHO
This is leading to the reception of more than one Power Control command in downlink (one from
each Node B in the active set). If at least one of the Node Bs in the active set is sending a power
down command, the UE will reduce its output power. It is enough, if one of the Node Bs is received
correctly.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 30/208
2.8.4.2 Uplink PC in SHO
In uplink, the UE is transmitting only one power control command for all connected Node Bs,
leading to the same power up/down steps of all connected Node Bs. If at least one link has good
quality (the SIR target is met), the UE sends a power down command.
2.8.4.2.1 Power drifting
Due to UL transmission errors it is possible, that not all Node Bs in the active set receive the same
power control command. This is leading to power drifting: some Node Bs perform a power up,
some a power down. This is degrading the performance of the SHO and should be avoided. Main
reason is that the Node Bs detect the PC commands independently and no MRC or selection
combining can be done (would cause to much delay). Thus the error rate for PC commands can be
higher than for transmitted user data.
2.8.5 Reporting events for Soft Handover and measurement reports
To find out the best cell or cells within UMTS, the UE measures the CPICH of all received neighbor
cells. The UE is told by UTRAN witch reporting events shall force the mobile to generate a
measurement report and sent it to the SRNC. This is different from GSM, where a measurement
report was generated at fixed time intervals (480 ms). So by using less reporting events within the
handover algorithms is leading to less measurement reports sent over the air interface.
In this chapter all HO events defined in 3GPP for intra-frequency measurements are listed. The HO
algorithms using this events are not standardized, but have to use reporting events out of the pool
given by 3GPP [25.331].
Intra frequency reporting events
1A A primary CPICH enters the reporting range
- A measured CPICH stronger than the best CPICH minus the reporting range
- Periodically reporting possible if cell is not added to active set due to any reason (cell addition
failure)
1B A primary CPICH leaves the reporting range
1C A nonactive primary CPICH becomes better than an active primary CPICH
- Non-active means, not in active set yet
- Periodic reporting possible if weakest cell is not removed from active set (cell replacement failure)
1D Change of best cell
1E A primary CPICH becomes better than an absolute threshold
1F A primary CPICH becomes worse than an absolute threshold
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 31/208
To additionally reduce the number of sent measurement reports, the system can apply two different
features for each of the triggering events separately:
A hysteresis value
Time-to-trigger (the event condition must be fulfilled for a certain time before the event itself
is triggered)
For each cell an individual offset can be applied to force or delay a the event triggering by
adding/subtracting the offset to the measured CPICH level at the UE.
2.8.6 Filtering E
C
/N
0
measures out of raw measures
According to [OPNET] and [25.331] the E
C
/N
0
measurements taken by the UE every timeslot (15
times per 10ms) on the CPICH of a neighbor cell are filtered by the following formula:
Equation 1: Filtering the measurements
Ec/Io
filtered
(n) = F * Ec/Io
averaged
(n) + ( 1 F ) * Ec/Io
filtered
(n -1)
Ec/Io
filtered
(n) The filtered measurement for radio frame n
Ec/Io
averaged
(n) The measurement averaged over the last radio frame n
F F=(1/2)
1/k
with k being transmitted by the UTRAN: k=(0,1,2,39,11,13,15,17,19)
As shown in [OPNET] we can convert the F(k) into an averaging period for the measurements. This
averaging period of the measurements can be compared to the averaging window size used for
averaging the raw measurements in GSM.
In the following table, we have the relation for some values of k, F and averaging period
Table 4: Impact of parameter F on averaging period
K F Averaging period
0 1 0.01 s
1 0.7071 0.014 s
9 0.0442 0.226 s
11 0.0221 0.452 s
13 0.0110 0.905 s
15 0.0055 1.810 s
17 0.0028 3.620 s
Simulations done in [OPNET] are leading to the conclusion that a averaging period of approximately
0.5s (k=11) is optimal for SHO performance.
2.9 Receive & Transmit diversity
In downlink the Node B is able to use space transmit diversity to compensate the missing space
diversity of the UE receive path. So transmit diversity exists only in downlink, contrary to receive
diversity which is possible in both directions. Find hereafter more information about he different
diversity schemes.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 32/208
2.9.1 Receiver diversity mechanisms
2.9.1.1 Uplink receiver diversi ty
Three different uplink receiver diversity mechanisms are possible:
- MRC diversity at the Node B due to antenna diversity gain
- MRC diversity in Softer HO
- Selection Diversity in Soft HO
Each of the three mechanisms is explained in a separate chapter afterwards.
2.9.1.1.1 MRC diversity at the Node B due to antenna diversity gain
If for one sector at the Node B two antennas are installed, both received signals can be combined by
using Maximum Ratio Combining (MRC). This is the so called antenna diversity already known
from GSM.
2.9.1.1.2 MRC diversity in Softer HO
As Softer HO is the HO between two sectors of the same Node B, the Node B can use MRC to
combine the received signals of the same communication of the two sectors. As the antennas of the
sectors in the regular case are located close to each other (similar to the distance the antennas of
one sector have to each other) the benefit of this additional diversity is quite small. The difference in
the received multipaths between the two sectors will not be big enough to benefit from the additional
MRC.
2.9.1.1.3 Selection Diversity in Soft HO
In case of Soft HO (HO between two cells not belonging to the same site/Node B) the difference in
the received multipath profiles is much bigger than in case of Softer HO. One can think, that this is
leading to a high diversity gain, but unfortunately the combining of the two signals has to be done
at the RNC. To be able to do MRC at the RNC, high bit rates on the I
ub
interface are required (e.g.
1.152 Mbit/s for a 144 Mbit/s LDD service because of 8 bit quantization instead of 1 bit
quantization per symbol). Up to now the require info for doing MRC at the RNC is not transmitted,
thus the RNC can only select the better signal out of the received ones (on a frame per frame basis),
it can not use the different received signals to improve the received ones. This kind of diversity is
called selection diversity.
2.9.1.2 Downlink receiver diversity
In downlink the UE is the receiver. As the UE has only one antenna for signal reception, no antenna
diversity takes place. Due to the implemented RAKE receiver the UE is able to benefit strongly from a
multipath environment by applying MRC. As the probability to have several multipaths is higher for
big distances between the transmit antennas, most benefit is expected from diversity during Soft HO.
For Softer HO the diversity gain due to multipath propagation is expected to be less.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 33/208
2.9.2 Downlink Transmit diversity mechanisms
The aim of transmit diversity is to increase the capacity of the downlink transmission. Indeed, two Rx
antennas are usually used in the Node B receiver for RX diversity. It would be also possible to use
several antennas in the UE, but this is not expected to be the case, since the extra complexity of
having several antennas in the UE would increase significantly the UE cost, weight and decrease the
autonomy that is not desirable. Moreover, antennas spatially separated are not possible for small
handsets, only polarization diversity would be possible. Transmit diversity aims to replace the
missing antenna diversity in the UE receiver by a kind of antenna diversity in the Node B transmitter,
thus enabling to improve the downlink performance and to avoid that the downlink limits the cell
range.
We can group transmit diversity techniques in two categories:
The Open Loop transmit diversity consists in using two techniques:
- The STTD (Space Time Transmit Diversity) is a coding in time and space to
permit the receiver to demodulate the data without additional complexity compared
to the non-diversity case.
- The TSTD (Time Switch Transmit Diversity) consists in transmitting the
signal alternatively on each antenna every slot.
The Closed Loop transmit diversity (feedback mode) consists in weighting the signals transmitted
by the two antennas. Contrary to the open loop TX diversity, the UE sends periodically weighting
information to the Node B. These weights inform the Node B the how to adjust the amplitudes
and the phases of the two transmission antennas. Two modes are possible: feedback modes 1
and 2.
Table 5 summarizes which TX diversity type is allowed on which physical channel type.
Table 5: Application of TX diversity modes on downlink physical channel types
Physical channel type Open loop mode Closed loop
TSTD STTD Mode
PCCPCH X
SCH X
SCCPCH X
DPCH X X
PICH X
PDSCH X X
AICH X
CSICH X
Note 1: Simultaneous use of STTD and closed loop modes on the same physical channel is not
allowed.
Note 2: If TX diversity is applied on any of the downlink physical channels it shall also be applied
on PCCPCH and SCH.
Note 3: The transmit diversity mode used for a PDSCH frame shall be the same as the
transmit diversity mode used for the DPCH associated with this PDSCH frame. During
the duration of the PDSCH frame, and within the slot prior to the PDSCH frame, the
transmit diversity mode (open loop or closed loop) on the associated DPCH may not
change. However, changing from closed loop mode 1 to mode 2 or vice versa, is
allowed.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 34/208
2.9.2.1 Open loop downlink transmit diversity
2.9.2.1.1 Space time block coding based transmit antenna diversity (STTD)
STTD is optional for the UTRAN, but its implementation is mandatory at the UE (and is of course
deactivated if UTRAN does not support STTD transmit diversity). The main advantages of STTD
include the use of the same orthogonal variable spreading factor (OVSF) code as non-diversity
scheme for both antennas. Thus complexity at the UE to despread the signals coming from the two
antennas with two channelization codes is not increased. The STTD can be applied on DPDCH, P-
CCPCH, S-CCPCH, AICH, and PICH channels.
The STTD encoding is applied on TPC, TFCI and Data symbols of the DPCH. Then, the DPCCH pilot
patterns defined by the standard are encoded and time multiplexed. The same spreading and
scrambling codes are used for both antennas. These spread and scrambled signals are transmitted
on antennas one and two after shaping by the FIR (emission Filter Impulse Response) and translating
in high frequency by the RF part (see Figure 16)
ENC
Data
INT
M
U
X
TPC
TFCI
M
U
X STTD
Encoder
Ant.2
Ant.1
Pilots
Ant.2
Ant.1
FIR RF
Ant.1
Spread /
Scrambling
FIR RF
Ant.2
Figure 16: Schematic Representation of STTD
The diversity gain provided by STTD is manifested by a reduction of the required received
downlink E
b
/N
0
.
2.9.2.1.2 Time switched transmi t diversity for SCH (TSTD)
Figure 17 illustrates the structure of the SCH transmitted by the TSTD scheme. In even numbered
slots signals are transmitted on antenna 1, and in odd numbered slots signals are transmitted on
antenna 2.
Antenna 1
Antenna 2
ac
s
i,0
ac
p
ac
s
i,1
ac
p
ac
s
i,14
ac
p
Slot #0 Slot #1
Slot #14
ac
s
i,2
ac
p
Slot #2
(Tx OFF)
(Tx OFF)
(Tx OFF)
(Tx OFF)
(Tx OFF)
(Tx OFF)
(Tx OFF)
(Tx OFF)
Figure 17: Structure of SCH transmitted by TSTD scheme
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 35/208
2.9.2.2 Closed loop downlink t ransmit diversity for DPCH transmission
The aim of transmit diversity is to maximize the received power at the UE. This is done by
transmitting the same signal with different amplitudes and phase shifts from two different antennas
(of the same site). The optimal weighting factors are determined by the UE and sent back to the
Node B by via the FBI field of the UL DPCCH.
The general transmitter structure to support closed loop mode transmit diversity for DPCH
transmission is shown in Figure 18. Channel coding, interleaving and spreading are done as in
non-diversity mode. The spread complex valued signal is fed to both TX antenna branches, and
weighted with antenna specific weight factors w
1
and w
2
. The weight factors are complex valued
signals (i.e., w
i
= a
i
+ jb
i
) in general, modifying amplitude and phase of the signal.
Spread/scramble
w
1
w
2
DPCH
DPCCH
DPDCH
Rx
Rx
CPICH
1
Tx
CPICH
2
Ant
1
Ant
2
Tx
Weight Generation
w
1
w
2
Determine FBI message
from Uplink DPCCH
Figure 18: DL transmitter structure for closed loop mode transmit diversity
2.10 CODECs supported by UTRAN
The GSM and UMTS standards define currently six different CODEC Types [26.103]:
Table 6: CODECS supported by the UTRAN
Name of the CODEC speech data bit rate
GSM Full Rate 13.0 kbit/s
GSM Half Rate 5.6 kbit/s
GSM Enhanced Full Rate 12.2 kbit/s
GSM Full Rate Adaptive Multi-Rate 4.75 12.2 kbit/s
GSM Half Rate Adaptive Multi-Rate 4.75 7.95 kbit/s
UMTS Adaptive Multi-Rate 4.75 12.2 kbit/s
Each of the six mentioned CODECS will be explained in more detail in this chapter.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 36/208
2.10.1 Fixed Rate CODECs
For all three fixed rate CODECS, DTX may be enabled in uplink and in downlink independently of
each other. DTX on or off is defined by the network on a cell basis and can not be negotiated at call
setup or during the call.
- GSM Full Rate
The GSM Full Rate CODEC Type supports one fixed CODEC Mode with 13.0 kBit/s.
- GSM Half Rate
The GSM Half Rate CODEC Type supports one fixed CODEC Mode with 5.60 kBit/s.
- GSM Enhanced Full Rate
The GSM Enhanced Full Rate CODEC Type supports one fixed mode with 12.2 kBit/s.
2.10.2 Adaptive Multi Rate CODECs
Adaptive Multi-Rate (AMR) is a new CODEC defined by ETSI. This technology relies on a set of pre-
defined "CODEC modes", each one providing optimum performance under specific radio
conditions. AMR is therefore a technology allowing for the real-time optimisation of the speech
coding scheme with respect to current radio propagation conditions. With CODECs such as FR and
EFR, the share of throughput given to speech coding and channel coding (speech protection) are
fixed trade-offs.
AMR is able to adapt the sharing speech information / speech protection (CODEC mode
adaptation) to current radio conditions, which can vary in a large scale, depending on location,
speed, interference, :
When radio conditions are very good, speech protection is reduced and the speech information
share is increased in order to improve speech quality,
When radio conditions are bad, speech protection share is increased to always keep the best
possible quality.
The CODEC mode adaptation is made up to each speech frame. This adaptation is illustrated in
Figure 19:
Figure 19: Functionality of the GSM AMR CODECs
- GSM Full Rate Adaptive Multi-Rate
The GSM Full Rate Adaptive Multi-Rate provides eight data rates in kbit/s:
12.2 10.2 7.95 7.40 6.70 5.90 5.15 4.75
- GSM Half Rate Adaptive Multi-Rate
The GSM Half Rate Adaptive Multi-Rate provides six data rates in kbit/s:
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 37/208
7.95 7.40 6.70 5.90 5.15 4.75
- UMTS Adaptive Multi-Rate
The UMTS Adaptive Multi-Rate provides eight data rates in kbit/s:
12.2 10.2 7.95 7.40 6.70 5.90 5.15 4.75
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 38/208
3 CHANNEL TYPES AND RADIO RESOURCE MANAGEMENT
Referenced documents
[Proc] UMTS Radio Procedures Pascal Pagani (PCS-F)
[Channels] UMTS Channels Celine Moignard (PCS-F)
[25.211] Physical Channels and mapping of transport channels onto physical channels3GPP
TS 25.211 V3.4.0 (Release 1999)
[WCDMA] WCDMA for UMTS, Holma & Toskala, John Wiley & Sons 2000,
ISBN 0 471 72051 8
[RAC&RLC] UTRAN Radio Admission control and Radio Load Control. P.Pagani
[OTC] Alcatel/Motorola document: UTRAN System Feature Requirements And Architecture
Specifications, FRAS Documents: Part 2: Overview of Telecom Functions, version 1.4
http://slsy1b.stgl.sel.alcatel.de/umts/homepage/
[25.213] Spreading and modulation (FDD). 3GPP TS 25.213 V3.2.0 (Release 1999)
[SysDesign] UTRAN system Design Document Ed.7, 3BK 10240 0005 DSZZA
The UTRA radio interface is layered into three protocol layers [Proc]:
Physical layer (L1)
Data link layer (L2)
Network layer (L3)
Layer 2 is split into following sub-layers: Medium Access Control (MAC), Radio Link Control (RLC),
Packet Data Convergence Protocol (PDCP) and Broadcast/Multicast Control (BMC).
Layer 3 is partitioned into sub-layers where the lowest sub-layer, denoted as Radio Resource Control
(RRC), interfaces with layer 2 and terminates in the UTRAN. The next sub-layer provides 'Duplication
avoidance' functionality.
The higher layer signaling such as Mobility Management (MM) and Call Control (CC) follows a
protocol architecture, which is similar to the current ITU-R protocol architecture, ITU-R M.1035.
Figure 20 shows a simple overview of the radio interface protocol architecture.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 39/208
MAC
MM
Duplication Avoidance
RRC
BMC PDCP
RLC
PHY Layer 1
Layer 2
Layer 3
CC
Logical
Channels
Transport
Channels
Figure 20: Radio Interface Protocol Architecture
3.1 Overview on channel t ypes and names
In UMTS three different channel types for data transmission and signaling are defined:
Physical channels (Layer 1)
Transport channels (Interface between layer 1 and 2)
Logical channels (Interface between layer 2 and 3)
Each of these channel types and the mapping between them will be described in more detail
hereafter.
3.1.1 Physical channels
Physical channels are channels really transmitted over the air. They are carrying transport channels
within their frames and time slots. Find all physical channels in FDD mode in Table 7. Closer
investigation of the physical channels is done in chapter 3.2 on page 43.
Table 7: Physical channels
Physical channel
AICH Acquisition Indication Channel
CPICH Common Pilot Channel
CSICH CPCH Status Indication Channel
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 40/208
Physical channel
DPCH
DPCCH & DPDCH
Dedicated Physical Channel
Dedicated Physical Control Channel & Dedicated Physical
Data Channel
DL-DPCCH for CPCH DL- Dedicated Physical Control Channel
PCCPCH Primary Common Control Physical Channel
PCPCH Physical Common Packet Channel
PDSCH Physical Downlink Shared Channel
PICH Paging Indication Channel
PRACH Physical Random Access Channel
SCCPCH Secondary Common Control Physical Channel
SCH Synchronization Channel
3.1.2 Transport channels
Transport channels are used as interface between Layer 1 and Layer 2 of the radio network
architecture. They are divided into
Common transport channels (all except DCH)
Dedicated transport channels (only DCH)
Coded Composite Traffic Channels (CCTrCH)
What common or dedicated transport channels are defined is summarized in Table 8. There is also
a short description of each channel given.
The CCTrCH is used to multiplex several transport channels into one new transport channel. This
CCTrCH is than mapped to one or several physical channels depending on the required bit rate. A
CCTrCH must fulfil the following criteria:
- A maximum of 5 transport channels can be multiplexed to one CCTrCH
- Only transport channels with the same active set can be mapped to one CCTrCH
- Different CCTrCHs can not be mapped onto the same physical channel
- Dedicated and common transport channels can not be multiplexed into the same CCTrCH
- For the common transport channels, only the FACH and PCH may belong to the same CCTrCH.
There are hence two types of CCTrCH:
- CCTrCH of dedicated type, corresponding to the result of coding and multiplexing of one or several
DCHs.
- CCTrCH of common type, corresponding to the result of the coding and multiplexing of a common
channel, RACH in the uplink, DSCH ,BCH, or FACH/PCH for the downlink.
The reason for using CCTrCHs is to provide a more efficient usage of resources. Due to multiplexing
of several channels into one channel and splitting of this new channel into pieces with the right size
for fitting into a physical channel, the physical channel are used more efficient.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 41/208
Table 8: Common and dedicated transport channels
Transport channels
RACH Random Access Channel
The Random Access Channel (RACH) is an uplink transport channel. The RACH is always
received from the entire cell. The RACH is characterized by a collision risk and by being
transmitted using open loop power control.
The RACH is intended to be used to carry control information from the terminal, such as
requests to set up a connection. It can also be used to sent small amounts of packet data from
the terminal to the network.
CPCH Common Packet Channel
The Common Packet Channel (CPCH) is an uplink transport channel and is a extension to the
RACH. The CPCH is associated with a downlink DPCCH with special slot format (for fast
power control commands transmission and CPCH signaling). Before transmission on CPCH
starts, the FACH in downlink is used to provide power control and CPCH control commands.
In the physical layer the main differences from the RACH are the use of fast power control
(inner loop power control), a physical layer based collision detection mechanism and a CPCH
status monitoring procedure.
FACH Forward Access Channel
The Forward Access Channel (FACH) is a downlink transport channel. The first FACH is
transmitted over the entire cell with low data rate. Additional FACHs in the cell can be
transmitted over only a part of the cell (e.g. beam forming antennas) using higher data rates.
The FACH is not allowed to use fast PC (inner loop PC). It can be used to transmit packet data
to the UE.
DSCH Downlink Shared Channel
The Downlink Shared Channel (DSCH) is a transport channel intended to carry dedicated user
data and/or control information; it can be shared by several users. In many aspects it is
similar to the FACH, but DSCH supports the fast power control as well as variable bit rate
open a frame-by-frame basis. The DSCH can be transmitted only over a part of the cell. It can
employ the different transmit diversity modes used by the associated downlink DCH. The
DSCH is always associated with a downlink DCH.
BCH Broadcast Channel
The Broadcast Channel (BCH) is a downlink transport channel that is used to broadcast
system- and cell-specific information. The BCH is always transmitted over the entire cell and
has a single transport format.
The broadcast channel carries information like random access codes and access slots in the
cell, or types of used transmit diversity. As it is mandatory to receive the BCH transport
channel to register to the corresponding cell, the BCH must be transmitted with relatively high
power.
PCH Paging Channel
The Paging Channel (PCH) is a downlink transport channel. The PCH is always transmitted
over the entire cell to be able to initiated a communication with the UE. The PCH is sent by all
cells within the location area of the mobile. The transmission of the PCH is associated with the
transmission of physical-layer generated Paging Indicators, to support efficient sleep-mode
procedures.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 42/208
Transport channels
DCH Dedicated Channel
The Dedicated Channel is a downlink or uplink transport channel. The DCH is transmitted
over the entire cell or over only a part of the cell using e.g. beam-forming antennas.
The contents of the DCH transport channel are not visible to the physical layer, thus the DCH
can carry user data and control information as well. The UTRAN will set the physical layer
parameters depending on DCH carrying control or user data. The DCH supports
Fast power control
Fast data rate change on a frame-by-frame basis
Soft HO
3.1.3 Logical channels
Logical channels are used as interface between Layer 2 and Layer 3 of the radio network
architecture.
Table 9: Logical control channels
Logical control channels
BCCH Broadcast Control Channel (DL)
System control information is broadcasted on the BCCH
PCCH Paging Control Channel (DL)
Paging information is broadcasted on the PCH channel.
CCCH Common Control Channel (DL & UL))
A bi-directional channel for transmitting control information between the network and UEs.
The logical CCCH channel is always mapped onto RACH/FACH transport channels.
DCCH Dedicated Control Channel (DL&UL)
The DCCH is a bi-directional channel, that transmits dedicated control information between
UE and UTRAN. The DCCH is established during RRC connection establishment procedure.
Table 10: Logical traffic channels
Logical traffic channels
DTCH Dedicated Traffic Channel (DL&UL)
The DTCH carries user data. It can exist in UL & DL.
CTCH Common Traffic Channel (UL)
A common downlink traffic channel to transfer dedicated user information to all or a group
of UEs.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 43/208
3.1.4 Mapping between different channel types
CCCH
CPCH DCH
DCCH
DTCH
PCH BCH FACH DSCH DCH
PCCH BCCH CCCH CTCH
DCCH
DTCH
UPLINK DOWNLINK
LOGICAL
CHANNELS
TRANSPORT
CHANNELS
PRACH
DPCCH
DPDCH
SCCPCH PCCPCH PDSCH
DPCCH
DPDCH
PHYSICAL
CHANNELS
PCPCH
SCH CPICH AICH PICH CSICH CD/CA-ICH
Standalone physical channels
without connection to transport layer
RACH
Figure 21: Mapping between logical, transport and physical channels
3.2 The physical channels
In this chapter the physical channels will be explained. They are separated into UL and DL channels,
chapter 3.2.1 and 3.2.2 respectively.
3.2.1 The physical channels in Uplink
Physical Channels in UL
PRACH Physical Random Access Channel
The PRACH is used to carry the RACH transport channel.
PCPCH Physical Common Packet Channel
The PCPCH is used to carry the CPCH transport channel.
DPCH
(DPCCH/DPDCH)
Dedicated Physical Channel
The DPCH is a summary of the two physical channels DPDCH and DPCCH.
The DPCCH carries user dedicated control information and the DPDCH
carries user dedicated data.
3.2.1.1 DPCH (DPDCH & DPCCH) in UL
There are two types of uplink DPCH, the uplink DPDCH and the uplink DPCCH. The DPDCH and
the DPCCH are I/Q code multiplexed within each radio frame. This is different from the downlink,
where DPDCH and DPCCH are time multiplexed on the same branch.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 44/208
The uplink DPDCH is used to carry the DCH transport channel. There may be zero, one, or several
uplink DPDCHs on each radio link.
The uplink DPCCH is used to carry control information generated at Layer 1. There is one and only
one uplink DPCCH on each radio link.
Figure 22 shows the frame structure of the uplink dedicated physical channels. Each radio frame of
length 10 ms is split into 15 slots, each of length T
slot
= 2560 chips, corresponding to one power-
control period.
Pilot
N
pilot
bits
TPC
N
TPC
bits
Data
N
data
bits
Slot #0 Slot #1 Slot #i Slot #14
T
slot
= 2560 chips, 10 bits
1 radio frame: T
f
= 10 ms
DPDCH
DPCCH
FBI
N
FBI
bits
TFCI
N
TFCI
bits
T
slot
= 2560 chips, N
data
= 10*2
k
bits (k=0..6)
Figure 22: Frame structure for uplink DPDCH/DPCCH
The control bits of the DPCCH are explained hereafter.
Pilot: The (mandatory) pilot bits are used for channel estimation for coherent detection. By
estimating the channel conditions, the receiver in the Node B can optimize its receiver
parameters. If the pilot bits on the DPCCH are not sufficient for channel estimation,
the CPICH (Common Pilot Channel) bits can be used for support.
TFCI: The (optional) Transport Format Combination Indicator (TFCI) informs the receiver
about the instantaneous transport format combination of the transport channels
mapped to the simultaneously transmitted uplink DPDCH of the radio frame.
FBI: The (optional) Feedback Indicator (FBI) is used to adjust the closed loop transmit
diversity parameters.
TPC: The Transmit Power control (TPC) carries in uplink the power control commands for
the Node B transmitter.
3.2.1.2 PRACH
The Random Access Channel (RACH) is an uplink transport channel that is used to carry control
information and user packets from the User Equipment (UE) to the Serving RNC (SRNC). When the
UE wishes to send information on the RACH, it listens to the logical Broadcast Control Channel
(BCCH) of the serving cell to learn the access parameters (and specifically the information
controlling the random access channel utilization). Using this access information, the UE initiates
sending the RACH preamble. After the UE has completed its preamble transmission on the RACH, it
listens to the Acquisition Indication Channel (AICH) to determine if the Node B received the RACH
preamble without error. Assuming that the Node B has indicated successful reception, the UE then
transmits the message part of the RACH. The UE sets the power level based on parameters received
on the BCCH. If the UE does not get a successful indication, it will retransmit the preamble after
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 45/208
using an algorithm to provide a random delay. The Node B accepts the message part of the logical
RACH and sends DCCH and User Data to the SRNC and CCCH to the CRNC.
The random-access transmission is based on a Slotted ALOHA approach with fast acquisition
indication. The UE can start the transmission at a number of well-defined time-offsets, denoted
access slots. There are 15 access slots per two frames and they are spaced 5120 chips (2 slots!)
apart.
Figure 23 shows the access slot numbers and their spacing to each other. Information on what
access slots are available in the current cell is given by higher layers.
#0 #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12 #13 #14
5120 chips
radio frame: 10 ms radio frame: 10 ms
Access slot #0 Random Access Transmission
Access slot #1
Access slot #7
Access slot #14
Random Access Transmission
Random Access Transmission
Random Access Transmission Access slot #8
Figure 23: RACH access slot numbers and their spacing
The structure of the random-access transmission is shown in Figure 24. The random-access
transmission consists of one or several preambles of length 4096 chips and a message of length 10
ms.
Message part Preamble
4096 chips 10 ms
Preamble Preamble
Figure 24: Structure of the random-access transmission
Figure 25 shows the structure of the random-access message part. The 10 ms message is split into
15 slots, each of length T
slot
= 2560 chips. Each slot consists of two parts, a data part that carries
Layer 2 information and a control part that carries Layer 1 control information. The data and control
parts are transmitted in parallel.
The data part consists of 10*2
k
bits, where k=0,1,2,3. This corresponds to a spreading factor of
256, 128, 64, and 32 respectively for the message data part.
The control part consists of 8 known pilot bits to support channel estimation for coherent detection
and 2 TFCI bits. This corresponds to a spreading factor of 256 for the message control part. The
TFCI value corresponds to a certain transport format of the current random-access message.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 46/208
Pilot
N
pilot
bits
Data
N
data
bits
Slot #0 Slot #1 Slot #i Slot #14
T
slot
= 2560 chips, 10*2
k
bits (k=0..3)
Random-access messageT
RACH
= 10 ms
Data
Control
TFCI
N
TFCI
bits
Figure 25: Structure of the random-access message part
This structure implies a (small) risk for collisions on the RACH. However, because of the used
preamble codes and random scrambling codes used on random access channels, it is possible to
have up to 80 random-access attempts within a 10 ms frame.
3.2.1.3 PCPCH
The PCPCH is used to carry the CPCH.
The CPCH transmission is based on DSMA-CD (Digital Sense Multiple Access Collision Detection)
approach with fast acquisition indication. The UE can start transmission at the beginning of a
number of well-defined time-intervals, relative to the frame boundary of the received BCH of the
current cell. The access slot timing and structure is identical to the RACH. The structure of the CPCH
access transmission is shown in Figure 26. The CPCH access transmission consists of one or several
Access Preambles [A-P] of length 4096 chips, one Collision Detection Preamble (CD-P) of length
4096 chips, a DPCCH Power Control Preamble (PC-P) which is either 0 slots or 8 slots in length,
and a message of variable length Nx10 ms.
4096 chips
P0
P1
Pj Pj
Collision Detection
Preamble
Access Preamble Control Part
Data part
0 or 8 slots N*10 msec
Message Part
Figure 26: Structure of the CPCH access transmission
The frame structure and possible slot formats of the PCPCH can be found in [25.211].
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 47/208
3.2.2 The physical channels in DL
Table 11: Summary of downlink physical channels
Physical downlink channels
DPCH
(DPDCH & DPCCH)
Dedicated Physical Channel
Dedicated Physical Data Channel (DPDCH) and Dedicated Physical Control Channel
(DPCCH) are time multiplexed on the same DPCH.
See more details in 3.2.2.1
DL-DPCCH for CPCH DL- Dedicated Physical Control Channel
This special DPCCH is always associated with a CPCH for PC and signaling of the CPCH.
CPICH
(P-CPICH & S-CPICH)
Common Pilot Channel
The CPICH consists of two sub-channels, the primary CPICH (P-CPICH) and the secondary
CPICH (S-CPICH). Find more information in 3.2.2.2
PCCPCH Primary Common Control Physical Channel
It is used to carry the BCH transport channel. See 3.2.2.3
SCCPCH Secondary Common Control Physical Channel
used to carry to FACH and PCH. See 3.2.2.4
SCH Synchronization channel
The SCH is needed for the cell search of the mobile and consists of a Primary SCH and a
Secondary SCH, which are sent in parallel. They are time multiplexed with the PCCPCH.
See 3.2.2.5.
PDSCH Physical Downlink Shared channel
The PDSCH is used to carry the DSCH. A certain code for channelization is given to the
PDSCH for one frame. During this frame all slots are allocated to one UE. The UE can
change every frame. Different UEs can be code multiplexed, using codes from the same
OVSF root during one frame. A UE knows when it has to decode the PDSCH by the DPCH
which is necessarily associated with a PDSCH connection of each UE. See 3.2.2.6.
AICH Acquisition Indication Channel:
The AICH is used to sent an acknowledgement to the UE after correct reception of the
RACH. The AICH is not visible to higher layers, thus directly controlled by the physical
layer. It has a spreading factor of 256 and consists of 15 repeated consecutive access slots
of 5120 chips duration (20 ms frame). 4096 chips are used by the AICH and for the other
1024 chips the transmission is either off, or they are used by the CSICH or other possible
future physical channels. See more information in [25.211]
PICH Page Indication Channel
The Paging Indicator Channel (PICH) is a fixed rate (SF=256) physical channel used to
carry the paging indicators. The PICH is always associated with an S-CCPCH to which a
PCH transport channel is mapped.
Once a PI message has been detected on the PICH, the UE decodes the next PCH frame
transmitted on the SCCPCH whether there is a paging message intended for it.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 48/208
Physical downlink channels
AP-AICH
CD/CA-ICH
CSICH
CPCH Access Preamble Acquisition Indicator Channel
CPCH Collision Detection/Channel Assignment Indicator Channel
CPCH Status Indication Channel
These physical channels have been specified for the CPCH access procedure. They carry
no transport channels, but only information needed in the CPCH access procedure. See
[25.211], [WCDMA]
Note: Find more information on all physical channels in [25.211]
3.2.2.1 Downlink DPCH
The main difference of DL DPCCH compared to UL DPCH is, that the DPDCH and DPCCH are time
multiplexed and both are transmitted on I and Q branch of the transmitter (QPSK modulation).
Having the same symbol rate in UL and DL, the QPSK is leading to nearly (minus multiplexed
control bit rate) doubled possible bit rate for user data in DL.
Closed loop power control is used and two kinds of transmit diversity are possible: Closed loop and
STTD open loop.
Figure 9 shows the frame structure of the downlink DPCH. Each frame of length 10 ms is split into
15 slots, each of length T
slot
= 2560 chips, corresponding to one power-control period.
One radio frame, T
f
= 10 ms
TPC
N
TPC
bits
Slot #0 Slot #1 Slot #i Slot #14
T
slot
= 2560 chips, 10*2
k
bits (k=0..7)
Data2
N
data2
bits
DPDCH
TFCI
N
TFCI
bits
Pilot
N
pilot
bits
Data1
N
data1
bits
DPDCH DPCCH DPCCH
Figure 27: Frame structure for downlink DPCH
The parameter k in Figure 27 determines the total number of bits per downlink DPCH slot. It is
related to the spreading factor SF of the physical channel as SF = 512/2
k
. The spreading factor may
thus range from 512 down to 4.
The exact number of bits of the different downlink DPCH fields (N
pilot
, N
TPC
, N
TFCI
, N
data1
and N
data2
) is
given in [25.211]. What slot format to use is configured by higher layers and can also be
reconfigured by higher layers.
There are basically two types of downlink Dedicated Physical Channels; those that include TFCI (e.g.
for several simultaneous services) and those that do not include TFCI (e.g. for fixed-rate services). It
is the UTRAN that determines if a TFCI should be transmitted.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 49/208
3.2.2.2 CPICH Common Pilot channel
The common pilot channel is an unmodulated code channel, which is scrambled by the cell specific
scrambling code. The CPICH is for aiding the channel estimation for dedicated channels and for
providing the channel estimation reference for common channels. Two types of CPICH are defined,
the primary and the secondary common pilot channel (P-CPICH & S-CPICH).
3.2.2.2.1 Primary Common Pilot Channel (P-CPICH)
The P-CPICH is used for performing measurements for handover and cell selection/reselection.
The Primary Common Pilot Channel (P-CPICH) has the following characteristics:
The same channelization code is always used for the P-CPICH
The P-CPICH is scrambled by the primary scrambling code of the cell
There is one and only one P-CPICH per cell
The P-CPICH is broadcast over the entire cell
The Primary CPICH is the phase reference for the following downlink channels: SCH, Primary
CCPCH, AICH, PICH. The Primary CPICH is also the default phase reference for all other downlink
physical channels.
3.2.2.2.2 SCPICH - Secondary Common Pilot Channel
A Secondary Common Pilot Channel (S-CPICH) has the following characteristics:
An arbitrary channelization code of SF=256 is used for the S-CPICH
A S-CPICH is scrambled by either the primary or a secondary scrambling code
There may be zero, one, or several S-CPICH per cell
A S-CPICH may be transmitted over the entire cell or only over a part of the cell (e.g. beam forming antennas)
A Secondary CPICH may be the reference for the Secondary CCPCH and the downlink DPCH. If this is the
case, the UE is informed about this by higher-layer signalling.
3.2.2.3 PCCPCH Primary Common Control Physical Channel
The Primary CCPCH is a fixed rate (30 kbit/s, SF=256) downlink physical channels used to carry the
BCH transport channel.
Figure 15 shows the frame structure of the Primary CCPCH. The frame structure differs from the
downlink DPCH in that no TPC commands, no TFCI and no pilot bits are transmitted. The Primary
CCPCH is not transmitted during the first 256 chips of each slot. Instead, Primary SCH and
Secondary SCH are transmitted during this period
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 50/208
Data
18 bits
Slot #0 Slot #1 Slot #i Slot #14
T
slot
= 2560 chips , 20 bits
1 radio frame: T
f
= 10 ms
(Tx OFF)
256 chips
Figure 28: PCCPCH frame structure
3.2.2.4 SCCPCH Secondary Common Control Physical Channel
The Secondary CCPCH is used to carry the FACH and PCH. There are two types of SCCPCH: those
that include TFCI and those that do not include TFCI. It is the UTRAN that determines if a TFCI
should be transmitted, hence making it mandatory for all UEs to support the use of TFCI. The set of
possible rates for the Secondary CCPCH is the same as for the downlink DPCH. The frame structure
of the Secondary CCPCH is shown in Figure 29.
Slot #0 Slot #1 Slot #i Slot #14
T
slot
= 2560 chips, 20*2
k
bits (k=0..6)
Pilot
N
pilot
bits
Data
N
data
bits
1 radio frame: T
f
= 10 ms
TFCI
N
TFCI
bits
Figure 29: SCCPCH frame structure
The parameter k in Figure 29 determines the total number of bits per SCCPCH slot. It is related to
the spreading factor SF of the physical channel as SF = 256/2
k
. The spreading factor range is from
256 down to 4. The values for the number of bits per field are given in [25.211].
The FACH and PCH can be mapped to the same or to separate Secondary CCPCHs. If FACH and
PCH are mapped to the same Secondary CCPCH, they can be mapped to the same frame. The
main difference between a CCPCH and a downlink dedicated physical channel is that a CCPCH is
not inner-loop power controlled. The main difference between the Primary and Secondary CCPCH is
that the transport channel mapped to the Primary CCPCH (BCH) can only have a fixed predefined
transport format combination, while the Secondary CCPCH support multiple transport format
combinations using TFCI. Furthermore, a Primary CCPCH is transmitted over the entire cell while a
Secondary CCPCH may be transmitted in a narrow lobe in the same way as a dedicated physical
channel (only valid for a Secondary CCPCH carrying the FACH).
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 51/208
3.2.2.5 SCH Synchronization Channel
The Synchronization Channel (SCH) is a downlink signal used for cell search. The SCH consists of
two sub channels, the Primary and Secondary SCH. The 10 ms radio frames of the Primary and
Secondary SCH are divided into 15 slots, each of length 2560 chips.
Figure 30 illustrates the structure of the SCH radio frame.
Primary
SCH
Secondary
SCH
256 chips
2560 chips
One 10 ms SCH radio frame
ac
s
i ,0
ac
p
ac
s
i,1
ac
p
ac
s
i ,14
ac
p
Slot #0 Slot #1 Slot #14
Figure 30: Structure of Synchronization Channel (SCH)
The Primary SCH consists of a modulated code of length 256 chips, the Primary Synchronization
Code (PSC) denoted c
p
in
Figure 30, transmitted once every slot. The PSC is the same for every cell in the system.
The Secondary SCH consists of repeatedly transmitting a length 15 sequence of modulated codes of
length 256 chips, the Secondary Synchronization Codes (SSC), transmitted in parallel with the
Primary SCH. The SSC is denoted c
s
i,k
in
Figure 30, where I = 0, 1, , 63 is the number of the scrambling code group, and k = 0, 1, , 14
is the slot number. Each SSC is chosen from a set of 16 different codes of length 256. This sequence
on the Secondary SCH indicates which of the code groups the cell's downlink scrambling code
belongs to.
The primary and secondary synchronization codes are modulated by the symbol as shown in figure
18, which indicates the presence/ absence of STTD encoding on the P-CCPCH and is given by the
following table:
P-CCPCH STTD encoded a = +1
P-CCPCH not STTD encoded a = -1
The SCH itself can have TSTD transmit diversity.
3.2.2.6 PDSCH Physical Downlink Shared Channel
A PDSCH is allocated on a radio frame basis to a single UE. Within one radio frame, UTRAN may
allocate different PDSCHs under the same PDSCH root channelization code to different UEs based
on code multiplexing. Within the same radio frame, multiple parallel PDSCHs, with the same
spreading factor, may be allocated to a single UE. This is a special case of multicode transmission.
All the PDSCHs under the same PDSCH root channelization code are operated with radio frame
synchronization.
PDSCHs allocated to the same UE on different radio frames may have different spreading factors.
The frame and slot structure of the PDSCH are shown on Figure 31.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 52/208
Slot #0 Slot #1 Slot #i Slot #14
T
slot
= 2560 chips, 20*2
k
bits (k=0..6)
Data
N
data
bits
1 radio frame: T
f
= 10 ms
Figure 31: Frame structure for the PDSCH
For each radio frame, each PDSCH is associated with one downlink DPCH. The PDSCH and
associated DPCH do not necessarily have the same spreading factors and are not necessarily frame
aligned.
All relevant Layer 1 control information is transmitted on the DPCCH part of the associated DPCH,
i.e. the PDSCH does not carry Layer 1 information. To indicate for UE that there is data to decode
on the PDSCH, two signaling methods are possible, either using the TFCI field of the associated
DPCH, or higher layer signaling carried on the associated DPCH.
In case of TFCI based signaling, the TFCI informs the UE of the instantaneous transport format
parameters related to the PDSCH as well as the channelization code of the PDSCH. In the other
case, the information is given by higher layer signaling. The channel bit rates and symbol rates for
PDSCH are given in Table 12.
Table 12: Slot formats of DPSCH with possible spreading factors
Slot format #i Channel Bit
Rate (kbps)
Channel
Symbol Rate
(ksps)
SF Bits/
Frame
Bits/ Slot Ndata
0 30 15 256 300 20 20
1 60 30 128 600 40 40
2 120 60 64 1200 80 80
3 240 120 32 2400 160 160
4 480 240 16 4800 320 320
5 960 480 8 9600 640 640
6 1920 960 4 19200 1280 1280
3.3 Radio resource management functions
Radio resource management (RRM) is responsible for the utilization of the air interface resources.
RRM is needed to guarantee quality of service (QoS), to maintain the planned coverage area and to
offer high capacity. Radio Resource Management is split in the following functions:
- Power control
aims at maintaining the right level of power to and from each mobile. This is further split in
closed loop and open loop power control - explained in chapter 2.
- Radio admission control (RAC)
is a CRNC function, checking whether new calls can be accepted with the service characteristics
required by the users, and maintaining the quality of already established calls in the cells of that
CRNC. It is explained in section 0 of this chapter. RAC itself is part of the Connection admission
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 53/208
control which is split into Call/Connection Admission Control of the ATM network part (CAC)
and RAC.
- Traffic volume measurement
function supervises the user data flow, in order to adapt the allocated radio resource to the
amount of data sent.
- Radio access bearer establishment, configuration and release
addresses the procedures of establishment of radio resources. It includes handling of radio
parameters.
- Radio resource allocation and management
function is in charge of allocating the channelization codes and temporary user identifiers used
in the UTRAN. This includes the problem of reshuffling the code tree, so as to enable high bit
rate connections.
- Radio load control
function aims at avoiding radio congestion. The section also indicates actions taken in case a
radio congestion situation occurs.
- Radio channel coding and decoding
describes the functions performed in the Node B to cope with the CDMA air interface. Among
other, this includes interleaving, rate matching, discontinuous transmission handling,
compressed mode handling, and of course, mapping to physical channels.
- Packet scheduling, multiplexing and retransmission
addresses the complex issue of dynamic optimization of resources both in downlink and uplink,
in particular the use of common and shared channels.
- RACH detection and handling
is devoted to the resource management aspects related to the Random Access Channel.
Table 13 shows which elements of the RAN are involved in the execution of each Radio resource
management (RRM) function.
Table 13 Radio resource management functions
Function
N
o
d
e
B
C
R
N
C
S
R
N
C
U
E
Radio Resource Management
a) RF Power control Closed Loop
RF Power Control, UL/DL Inner Loop
X X
RF Power Control, UL Open Loop
X X
b) RF Power Control, UL/DL Outer Loop (= QOS control)
X X
c) Radio Admission Control
X
d) Traffic Volume Measurements per UE
X
e) Traffic Volume Measurements on common channels
X
f) Radio Access Bearer Establishment, Reconfiguration, and Release
X
g) Radio Resource Allocation and Management
X
h) Radio Load Control
Radio Overload Prevention X
Radio Overload handling X
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 54/208
Function
N
o
d
e
B
C
R
N
C
S
R
N
C
U
E
Radio Resource Management
i) Radio Channel Coding/Decoding
X X
j) NRT Services Scheduling, Multiplexing and Retransmission
CH scheduling X
CH scheduling X
Scheduling control on RACH X
AC on DCH X
transmission X X
k) RACH management
CH detection and control X X
CH handling for CCCH X
CH handling for DCCH and user data X
CI detection X
In this version of the document besides Power Control in chapter 2, only the Radio Admission
Control function RAC is explained in more detail.
3.3.1 Radio Admission Control
In the CDMA system, since the uplink and downlink are asymmetric, the RAC algorithm is different
for uplink and downlink. When the both RAC algorithm admit, the connection can be established.
The RAC part is in accordance with [SysDesign].
3.3.1.1 Admission control for uplink
Three types of admission control are desirable to be considered.
- Received power admission control
- Active user based admission control
- Channel element based admission control
3.3.1.1.1 Received power admission control
This algorithm is based on the noise rise calculation. The Node B always measures the noise rise.
When the establishment of the new connection is requested, the RAC function makes a judgement
whether to grant the request by comparing the average actual noise rise in a certain period,
assumed increment of noise rise caused by adding the new connection and the threshold noise rise
value predetermined.
This algorithm is highly reliable because it is based on the actual measurement value. However, it is
not easy to precisely analyze the increment of noise rise when the new connection is added because
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 55/208
the increment of the interference from the adjacent Node B, which is caused by adding the new
connection in question, should be taken into account.
To develop this algorithm, the following parameters will be needed.
- The actual noise rise measured by Node B
- The time of period to be used for averaging*
- The threshold value*
- The increments of noise rise for every service according to the actual noise rise at a given
time*
The parameters marked with asterisk should be able to change by software.
3.3.1.1.2 Active user based admission control
This algorithm is based on the number of active users. The RAC function makes a judgement
whether to grant the request by comparing the number of active users assumed after the new
connection is established and the maximum number of active users calculated logically. Since there
are several services and its capacity is different respectively, the calculation of total number of active
uses is complicated. One method is to decide a certain service as the standard, convert the number
of active user of the other services to that corresponding to the standard service.
This algorithm is the one based on the theory and the result of simulation, and used to complement
the noise rise based algorithm which is based on the actual measurement value
To develop this algorithm, the following parameters will be needed.
- The number of active users of each service in presence
- The weight to convert the number of active users of a certain service to that of the standard
service*
- The maximum number of active user of the standard service*
The parameters marked with asterisk should be able to change by software.
3.3.1.1.3 Channel element based admission control
This algorithm is based on the number of BB channels. The RAC function makes a judgement
whether to grant the request by comparing the number of BB channels used and the number of BB
channels available. It is necessary to consider that some BB channels should be reserved for the
handover users in the adjacent Node B according to the handover ratio.
To develop this algorithm, the following parameters will be needed.
- The number of BB channels to be used
- The number of BB channels reserved for handover user*
- The total number of BB channels that the Node B has
The parameters marked with asterisk should be able to change by software.
3.3.1.2 Admission Control for Downlink
Admission Control for Downlink shall have the three following parts:
- Transmit power based admission control
- Active user based admission control
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 56/208
- Channel element based admission control
3.3.1.2.1 Transmit power based admission control
This algorithm is based on the transmit power available. The RAC function makes a judgement
whether to grant the request by comparing the transmit power available, which equals to the
difference between the maximum transmit power and the average transmit power used, and the
required transmit power for the new connection.
To develop this algorithm, the following parameters will be needed.
- The transmit power used
- The time of period to be used for averaging*
- The maximum transmit power
- The transmit power required for the new connection*
The parameters marked with asterisk should be able to change by software.
3.3.1.2.2 Active user based admission control
Same as uplink.
3.3.1.2.3 Channel element based admission control
Same as uplink.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 57/208
4 UMTS SERVICES AND TRAFFIC MODELING
REFERENCED DOCUMENTS
[Agin_LL] Summary of UTRA/FDD Link Lever Performance Results, P. Agin,
Ref: TD/SYT/pag/740.99
[SysDesign] UTRAN System Design Document Ed.7, 3BK 10240 0005 DSZZA
RELATED DOCUMENTS
[Asp] Theory of Traffic Modelling, Version 1.5, X. Asperge, MND internal document
[ETSI] ETSI document TR101 112 v3.2.0. (1998-04), formerly UMTS 30.03 version 3.2.0.
[MND1] UMTS Radio Interface Dimensioning, S. Joga, MND internal document
[POM] A page-oriented WWW traffic model for wireless system simulations, A. Reyes-Lecuona,
E. Gonzalez-Parada, E. Casilari, J.C. Casasola and A. Diaz-Estrella in 16
th
International Telegraphic Congress, Vol 2, pp 1271-1280, Edinburgh, June 1999
[Prob] "Probabilits", Jacques Neveu, Script of Ecole Polytechnique, Edition 1997
4.1 Introduction
In contrary to second generation mobile radio systems, where one single type of quality criteria
designed for speech determines the radio design process, for UMTS a multitude of different bearer
services with different quality requirements have to be taken into account. Each service needs a
different portion of the available resource, the air interface, dependent on parameters like the bit-
rate, the maximum delay and the tolerable maximum bit error rate. Additionally, the user activity for
different services shows different statistical behaviour which has to be described by according
stochastical traffic models in order to judge the expected traffic created by the service mix.
Since in a CDMA system the cell range is traffic dependent, reliable traffic models play an important
role in the UTRA/FDD radio design.
In a CDMA system, a user is only taking resources (capacity) from the network if he is causing
interference for the other users, meaning that he is emitting (contribution to uplink interference) or
receiving (contribution to the downlink interference). Therefore, even for circuit switched services,
where the user is assigned a circuit switched channel for the whole time of the connection, he does
not block resources
2
when he is not emitting (resp. receiving). Thats why the notion of service
activity has been introduced, described by the activity factor.
An additional aspect of the UMTS system consists in the multiservice. Due to the fact that users of
different services are dynamically using resources from the same pool, there is a certain trunking
efficiency compared to a scenario where a given capacity is divided a priori between different
services. In the latter case, one can dimension the required resources for the different services
2
except the channelization codes
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 58/208
separately, in the former case, a common approach has to be found taking into account the traffic
mix.
4.2 UMTS Services
The notion of service is used within the UMTS world with a variety of different meanings. At a first
glance, one would associate the word service with the user application, like web-browsing or e-
mail. The following list represents an exemplary choice of such service applications:
Personal Communications
Voice
Voice over IP protocol
Voice mail
E-mail (without attachment)
Text / SMS messaging
Multimedia messages:
Still images, video, text, sound
Conversion of media
Video telephony / conference
Mobile office
Internet access, browsing
Intranet access, browsing
Corporate database access
E-mail with possible attachments
Rapid File/Data transfer
Collaborative working (tele-presence) (tele-work)
Agenda synchronisation with PDA
Expert on line
Remote diagnostics / maintenance (e.g. network administrator)
Location based services
Navigation services (position)
Traffic information (depending on where the car is and goes)
Tourist information / virtual tourist guide
Maps, images download (e.g. of neighbouring sites)
Time table / schedule information (train schedules)
Locator services
Fleet management (positioning and follow-up) (fleet management: taxis, trucks)
Telemetry
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 59/208
Remote health monitoring
Remote data acquisition and transfer (e.g. gathering weather forecast data)
Remote monitoring & control
Remote surveillance / alarm
E-commerce
On-line banking
E-cash integrated in the mobile
Electronic ticketing
Interactive shopping, delivery
Intelligent brokering
Information services
Yellow pages
Push & pull news / information (launching search for information)
E-newspaper
Health
Education, training
Entertainment
Sports news
Interactive games
Gambling
E-magazines
Audio on demand
Video-clips on demand
However, in order to predict the impact of such a service application on coverage and capacity,
other attributes have to be examined. In this context, a service is defined by the following
characteristics, which will be explained in detail in the next chapters:
- the connection type (circuit switched or packet switched)
- the user bit rate(s)
- the required QoS and the related radio quality in terms of E
b
/N
0
for uplink and downlink
- the required GoS for this service
- the statistical behaviour described by the according traffic model and its parameters
4.3 Traffic Modelling
It has to be mentioned that the notion of traffic model is used for two different aspect of traffic:
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 60/208
- On a first level, traffic model refers to modelling the statistical behaviour of one user using one
given service: It gives probability density functions to reflect the user traffic generation. For better
distinction, this could be called microscopic traffic model.
- On a second level, traffic model refers to the statistical modelling of the behaviour of a
multitude of users using a limited resource in order to define the necessary resource allocation.
Since in the UMTS system, users of different services with different microscopic traffic models are
sharing the same resource, an overall traffic model approach is necessary. This overall model is
called macroscopic traffic model.
4.3.1 Microscopic Traffic Models
Looking at the exemplary list of service applications, one understands intuitively that the statistical
behaviour of the resource utilisation is different for each service. For example an active web user clicks
once in a while to download a page, generating small uplink traffic and very bursty downlink traffic, leaving
blank times in between, which would allow to give the resource to another user at the same time, whereas a
video conference user blocks his uplink and downlink for the whole time of the session. However, it seems
quite clear that it is impossible to reflect the statistical behaviour of each user of every thinkable service
application in analytical or even simulative prediction. Therefore, only a few traffic models are used for
analyse purpose, each of them represented by a set of parameters. Depending on the traffic model, one needs
therefore a different number and type of parameters to characterise a service entirely. In the course of this
paper, one distinguishes between circuit switched and packet switched traffic model.
In UMTS network predictions using simulations (e.g. Monte Carlo simulations), the subscribers (which are
potential users) of the different services are distributed randomly (according to a distribution function) on a
given area. Then, the behaviour of each of them is simulated according to the microscopic traffic model
applied for the relevant service, so that at a snapshot in time, the position and number of active users and
their service is determined. The following calculations are therefore deterministic, no macroscopic traffic
model is needed. Radio Resource control algorithms decide over blocking and delay, so that after a
sufficiently high number of simulation runs, blocking resp. delay statistics can be elaborated to decide if the
GoS is fulfilled for each service.
4.3.2 Macroscopic Traffic Models
In case of analytical predictions, we have to assure that the common pool of resources is sufficient
to satisfy the traffic with the required GoS for each service by a macroscopic traffic model, taking
into account the behaviour of all subscribers using the different services.
The according example for a macroscopic traffic model in GSM is the good old Erlang B law for
voice, which produces for a given traffic intensity and number of available voice channels the
according blocking probability, resp. gives the number of needed channels to treat the given traffic
intensity with a required blocking probability. However, the example is not really applicable since it
is dealing with monoservice.
4.4 Service Definition
4.4.1 Circuit Switched Services
The following table gives an overview on the input parameters defining a circuit switched service.
Bit rate
User bit rate for the circuit connection
QoS and Radio BER and associated E
b
/N
0
[dB] per multipath environment for uplink
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 61/208
quality
BER and associated E
b
/N
0
[dB] per multipath environment for downlink
GoS Maximum acceptable Blocking Percentage
Microscopic Activity Factor for uplink
Activity Factor for downlink
Session inter-arrival time in sec
Session length in sec
Traffic Modelling
Parameter
Macroscopic Traffic intensity in Erlang within the cell
respectively:
Number of subscribers N within the given cell and traffic
intensity per subscriber (in mErlang)
4.4.1.1 Bit rate:
A circuit switched connection implies a constantly available traffic channel of a given channel
bandwidth in both uplink and downlink direction. Therefore, for characterisation of a circuit switched
contains only one user bit rate
3
, which is the effective bit rate (information bit rate) of this circuit
channel.
The bit rates 64, 144 and 384 kbit/s for circuit switched data and 8kbit/s for speech have been
defined by 3GPP as reference bit rates in order to be able to compare simulation results of different
3GPP members. Within a real UMTS system, there is a high granularity of possible user bit rates, so
that any other user bit rate together with any other BER requirement could occur. However, it is quite
clear that a prediction gets very complicated if one allows this granularity in service, so that in
general, service applications are mapped on the above bit rates for prediction purpose.
For the product release 3G R1.1 (see [SYSDESIGN]), the following bit rates are intended to be
implemented:
Speech will be implemented with the conversational AMR (adaptive multirate)
Speech Bit rate (Uplink / Downlink) kbit/s
Type Conversational AMR 4.75 12.2 / 4.75 12.2
The 9 AMR modes specified in TS26.071 are supported, and the AMR mode to be used can be
configured by O&M.
Additionally, the following circuit switched service is intended to be implemented in 3G R1.1
Circuit switched data Bit rate (Uplink / Downlink) kbit/s
Type Conversational 64/64
This type of service is intended to support ISDN services from CS domain, and a residual BER of 10
-6
is thus allowed.
3
The notion of user bit rate referes to the effective bit rate at RLC level, meaning without error
correction or channel codin bits. It is not to be confused with the channel bit rate
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 62/208
4.4.1.2 Radio Quality and QoS
The required radio quality is given by a E
b
/N
0
target value for uplink and one for downlink. E
b
represents the energy per information bit and N
0
represents the overall noise (thermal noise, intra-
cell and extra-cell interference) after the Rake receiver. The E
b
/N
0
is measured in the receiver after
the data demodulation. The E
b
/N
0
target value is required to achieve a certain BER (Bit error rate).
The mapping of BER and E
b
/N
0
is dependent on the particular multipath and propagation
conditions, which also depend on the mobile speed, and on the used equipment. This means as
those conditions vary the E
b
/N
0
quality parameter also varies.
Alcatel has performed link level simulations which give for speech
4
(8 and 12.2 kbit/s) and circuit
switched data (64, 144 and 384 kbit/s) for the 3GPP defined propagation environments Pedestrian
A and Vehicular A in combination with the mobile velocities 3, 50 and 120km/h the required radio
qualities for uplink and downlink [Agin_LL]. The performance is expressed as the average received
E
b
/N
0
required to reach the required quality which was assumed to be a BER of 10
-3
for speech
service and a BER of 10
-6
for circuit switched services. Please refer to Annex A and B for the
according result tables.
In 3GPP notation, the above mentioned circuit switched data services along with the BER
requirement are often referred to as LCD (Long Constrained Delay) data services.
4.4.1.3 Grade of Service (GoS)
The GoS for a circuit switched service is generally given in terms of maximal allowed blocking
probability in [%].
4.4.1.4 Microscopic Traffic Model
The traffic model applied to circuit switched services is a traditional birth-death process, also known
as Erlang-B-model. It is described by the following parameters:
Session inter-arrival time 1/ (in seconds)
time between the beginning of two consecutive sessions, it is an exponentially distributed random
variable.
Session length 1/ (in seconds):
duration of the session, it is also an exponentially distributed random variable.
4
Speech is a classical circuit-switched service
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 63/208
t
I n t e r - a r r i v a l t i m e :
e x p o n e n t i a l , p a r a m e t e r 1 / a v e r a g e t i m e
S e s s i o n l e n g t h :
e x p o n e n t i a l , p a r a m e t e r 1 / a v e r a g e l e n g t h
Please note that the traffic intensity per user r which is an input of the macroscopic model, can be
derived out of these parameters:
H
Note that the parameters are identical on both uplink and downlink for circuit services, which is not
true for packet services.
For the circuit switched connections, where a constant traffic channel is elaborated, an activity factor
o can be given. For example for speech which is a circuit switched service, the voice activity factor is
around 0.5, which means, that the channel is used only half of the time, because a user talking via
the downlink means a listening user in the uplink and vice versa. A listening and therefore not
transmitting user doesn't cause interference, which has to be taken into account for capacity
calculations. The application of the activity factor is also treated by the traffic model.
Activity factor:
ratio between emitting periods within the session ant the total session duration, therefore probability
to emit
4.4.2 Packet Switched Services
It has to be noted that uplink and downlink must be studied separately because asymmetry may
induces strong variations on the parameters between uplink and downlink.
Uplink: Mean User bit rate
Peak User bit rate
Minimum User bit rate
Bit rate
Downlink: Mean User bit rate
Peak User bit rate
Minimum User bit rate
Uplink:
BLER and associated E
b
/N
0
[dB] per multipath environment QoS and Radio
quality
Downlink BLER and associated E
b
/N
0
[dB] per multipath environment for
downlink
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 64/208
Uplink:
acceptable maximum delay time d
UL
x%
and quantile x%
(in x% of the cases, the delay has to be lower than or equal
to d
x%
.)
GoS
Downlink
acceptable maximum delay time d
DL
x%
and quantile x%
(in x% of the cases, the delay has to be lower than or equal
to d
x%
.)
Microscopic Dependent on Traffic Model.
For page oriented model:
mean inter-arrival time
mean number of pages per session
standard deviation of the number of pages per
session,
mean reading time
standard deviation of reading time
minimum page size
mean page size
mean inter packet time
packet multimodal distribution
Please note that only the mean page size is used later on in our
macroscopic model
Traffic Modelling
Parameter
Macroscopic Data Volume per busy hour V (in kbit/busy hour) per
subscriber
Number of subscriber N
4.4.2.1 Bit rates
Packet switched services are normally variable bit rate services and can therefore be described by
the mean bit rate and the peak bit rate. Sometimes, the minimum bit rate is given as well. Peak bit
rate and minimum bit rate are instantaneous bit rates. The mean bit rate is referring to the average
over the transmitting time, meaning that times where the user isnt sending anything are not taken
for the average.
Additionally, it has to be noted that the uplink bit rate can be completely different from the downlink
bit rate of the according service.
Alcatel has performed simulations on packet switched services where the bit rate is modeled as
being constant in the simulations, but with a lower rate than the peak bit rate (peak bit rates of 64,
144 and 384 kbps are modeled as a constant bit rate of 30.4, 60.8 and 243.2 kbps). This constant
bit rate is equivalent to the mean bit rate.
Please note that this effective bit rate does not yet include the retransmission rate for erroneous
packets. Since BLER of 0.1 (see 4.4.2.2) has been acceptable value in the simulations, a
retransmission of 10% of the blocks has to be taken into account additionally when looking at the
effective rate for the user.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 65/208
In 3GPP notation, the above mentioned packet switched data services are often referred to as
UDD (Unconstrained Delay Data) services.
In the Evolium product release 3G R1.1, the following bit rates are intended to be implemented
[SysDesign]:
Packet Switched Data Bit rate (Uplink / Downlink) kbit/s
Type Background 64/128
64/384
384/384
4.4.2.2 QoS and Radio Quality
Alcatel has performed link level simulations which give for packet switched services with the peak bit
rates of 64, 144 and 384 kbps the 3GPP defined propagation environments Pedestrian A and
Vehicular A in combination with the mobile velocities 3, 50 and 120km/h the required radio
qualities for uplink and downlink [Agin_LL].
The performance is expressed as the average received E
b
/N
0
required to reach the quality of service
(QoS). The required QoS was assumed to be a BLER (Block Error Rate) of 0.1 for packet switched
services. Thanks to the retransmission of corrupted blocks, this BLER is acceptable. The user receives
only non-erroneous packets. Please note that the retransmission rate of the packets is not yet
included in the above user bit rate.
4.4.2.3 Grade of Service
The GoS is given in terms of delay. However, we are not talking about a maximum acceptable
delay, since in a packet system, the delay could reach infinity in very rare cases (this would be equal
to a blocking of the packet), but we are referring to a percentile delay d
x%
, which induces that in x%
of the cases, the delay has to be lower than or equal to d
x%
.
The acceptable delay may be different for uplink and downlink.
4.4.2.4 Microscopic Traffic Models
There are a multitude of traffic models for the traffic generated by a packet user, mainly depending
on the service application. It is intuitive that the statistical behavior of a web user who asks from time
to time for a page is different than from an e-mail user, who is sending e-mails with or without
attachment by one click. However, as said already before, the number of different applied traffic
models raises the complexity of prediction. In the following, the so called page oriented model
(POM) for web-like service is explained shortly. For other models as the ETSI model or the page
oriented model for e-mail traffic, please refer to [Asp].
4.4.2.5 The Page-Oriented Web-Browsing Model
A three-level structure was created, considering session, page and packet levels based on behaviour
of WWW users. The scheme is the following:
- Session level:
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 66/208
Session inter-arrival time: time between the beginning of two consecutive sessions, it is an
exponentially distributed random variable.
Number of pages per session: number of web pages browsed by the user, it is a log-
normal-distributed integer random variable.
- Page level:
Time between pages (or reading time): corresponds to the time during which the user
reads one page, it is a gamma-distributed random variable.
Page size: the total amount of information in bytes transferred per page, it is a Pareto-
distributed random variable. Values can be different on the uplink and downlink.
- Packet level:
Packet inter-arrival time: time between two consecutive packets inside the same page.
Uplink and downlink packets are treated separately. It is an exponentially distributed random
variable.
Packet size: number of bytes contained in each packet. It is a random variable following a
multimodal distribution. Again, uplink and downlink packets are considered separately with two
different multimodal distributions. The transmission time of a packet equals its size divided by
the transmission bit rate (expressed in bytes per second).
In the simulation, a page must be entirely downloaded before reading: the sum of the sizes of the
packets of one page equals the size of the page (all sizes expressed in the same unit, for instance
bytes).
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 67/208
Session level
Packet level
Page level
Page size:
Pareto
Reading time:
Gamma law
Session inter-arrival time:
exponential
Packet size:
multimodal
Inter-packet time:
exponential
Number of pages:
log-normal
The sum of the blue packet sizes equals the yellow page size (in bytes)
t
t
t
On the whole, nine parameters (mean inter-arrival time, mean number of pages per session,
standard deviation of the number of pages per session, mean reading time, standard deviation of
reading time, minimum page size, mean page size, mean inter packet time, packet multi-modal
distribution) are required to define completely a service. It has to be noted that those parameter are
not easily being obtained to fit to a given service application.
The page oriented model is suitable as a basis to achieve simulation results, however its far to
complex to be applied on a analytical macroscopic model.
4.5 Macroscopic Traffic Model for Link Budget Analysis
4.5.1 Concept
For the traffic treatment , we are using the property of a CDMA network, that a user is only using
network capacity if he is generating interference for the others:
In a first step, we determine how many connections of one service we accept at maximum within a
given cell, so that in any possible case, the blocking (for circuit switched) and delay requirements (for
packet switched) are maintained. This corresponds to the classical reservation of channels for traffic
dimensioning. However, the term reservation is deliberately avoided, since a channel is only
existing if a user is really transmitting (resp. receiving).
One could interpret this calculation as a kind of admission control (for CS) resp. radio resource
control (for PS), since already at this stage, we are determining a certain number of calls (according
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 68/208
to GoS requirements) are blocked resp. delayed. We are referring to this step as the acceptance
step of the macroscopic model.
In a second step, we will take into account the fact that not necessarily all of these accepted
channels will be on air by treating the number of emitting channels for each service as a random
variable. This makes the uplink load as well as the downlink transmit power (which are both
dependent on the interference in the cell and therefore on the number of emitting channels per
service) also random variables. By setting an according probability threshold, the UMTS service
coverage predictions can be executed to cover most of the GoS without taking an unrealistic worst
case. This step is further on called the outage step.
This approach takes the trunking efficiency between the different services into account, since the
probabilistic contribution of users of different services is maintained until the overall parameters
(uplink load and downlink power) are calculated.
The overall process is illustrated in Figure 32.
CS 1
CS 2
PS 1
PS 2
PS 3
Acceptance
Step:
GoS:
blocking (CS)
delay (PS)
Number of
communications
per service,
occupation rate
Outage
step:
pdf of cell
load (UL)
pdf of power
(DL)
x (99%)
Figure 32 Process of Macroscopic Traffic Model
4.5.2 Acceptance Step
4.5.2.1 Circuit Switched Model
For each service k, we want to derive the number of accepted connections (reserved channels) in
case of a certain Grade of Service (GoS), expressed by the Blocking probability.
All calculations are performed for one given service k. For convenience, it has been renounced to
use the index k for each parameter, however it has to be added when talking of different services.
The traffic model is applied within each iteration of the link budget process (see chapter 5
The inputs given to the traffic model by the the planner are:
- traffic intensity H HH H per subscriber (in mErlang)
- blocking probability
5
P
block_thr
- Number of subscribers per sqkm
5
Please note that the outage step increases the non-served and therefore blocked calls, so that the
probability should be lower than the one given by the operator. An estimation for the
combined outage probability is given in [MND1]
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 69/208
Since within one iteration of the link budget, the cell radius is fix, this input can be transformed
into
Number of subscribers N within the given cell
The total traffic intensity within the cell is given by
N H H
The number of connections C is derived by the well known Erlang B law. A given number of
channels C gives the following Blocking probability:
C
i
i
C
block
i
C
P
0
!
!
H
H
So we have to find the smallest C for which P
block
<P
block_acc
. This has to be done by an itaration. As a
starting value, we take C
0
=[ 1], where [x] denotes the integer part of x (truncation of x). Then, in
each following iteration step, C ist incremented by 1 until the requirement is fulfilled.
Instead of performing this iteration, a standard Erlang B look-up table can be used of which Table 14 shows
an extract. For a given required blocking probability (header row) and a given traffic intensity (table entry),
the required number of channels can be detected (leftmost column).
Nr. of Blocking Probability for Erlang B
channels 0.1% 0.2% 0.5% 1% 2% 5%
1 0.001 0.002 0.005 0.010 0.020 0.053
2 0.046 0.065 0.105 0.153 0.223 0.381
3 0.194 0.249 0.349 0.455 0.602 0.899
4 0.439 0.535 0.701 0.869 1.092 1.525
5 0.762 0.900 1.132 1.361 1.657 2.218
6 1.146 1.325 1.622 1.909 2.276 2.960
7 1.579 1.798 2.157 2.501 2.935 3.738
8 2.051 2.311 2.730 3.128 3.627 4.543
9 2.557 2.855 3.333 3.783 4.345 5.370
10 3.092 3.427 3.961 4.461 5.084 6.216
Table 14 Erlang B look up table
Example:
For a required blocking probability of 2% and traffic intensity of 2.9 Erlang, the number of required
channels is C=7.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 70/208
4.5.2.2 Packet Switched Model
Like for the circuit switched case, we want to derive by the help of a traffic model for each service a
number of accepted channels. It has to be noted that for one service, this has to be done separately
for uplink and downlink, since no closed circuit is given. (We may need more channels of the
same service in the downlink than in the uplink). So all following calculations have to be executed
twice, once for uplink and once for downlink. All calculation are performed for one given service k
and one determined link. For convenience, it has been renounced to use the indices k, UL and DL
for each parameter.
The packet switched input we will get for the traffic model from the operator are
- Data Volume per busy hour V (in kbit/busy hour) per subscriber
- acceptable maximum delay time d
x%
(in x% of the cases, the delay has to be lower than or equal
to d
x%
.)
- Number of subscriber per sqkm, from which we can derive within the iteration of the link budget
process (see chapter 5)
Number of subscriber N
We assume a M/M/C/ queuing model (also known as Erlang C model), on page
6
level, meaning
that pages are assumed to be continuous blocks (calls), that their interval time is exponential and
that their length is exponential (Poissonian model). C channels are available and the queue is
infinite.
The model is similar to the model for CS services, the call being a page transmission, except that
queuing is possible if no channels are available. Working on page level implies that a link is
reserved for a user for a whole page.
The model is optimistic in the sense that the Poissonian model doesnt reflect the self similarity of
packet traffic and that the bursty nature of the packets within the pages is not taken into account.
In order to derive a number of channels needed for a certain traffic, accepting a delay (waiting time)
W for x% of the arriving pages (calls) by the inverse Erlang C law, one needs the following inputs:
- traffic H HH H intensity (in Erlang),
- mean page length 1/ (in seconds)
- acceptable waiting time W
x%
(x% of the pages have to have a waiting time lower than or equal
to W
x%
)
Now, the packet switched traffic inputs have to be translated into those Erlang C parameters.
We start by stating that the parameter d
x%
is equivalent to W
x%
. Let us further describe the x% by the
parameter p
delay
=x%/100.
For the traffic , the following is valid:
H
where
6
For definition of page see chapter 4.4.2.5 and document [Asp]
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 71/208
H HH H traffic intensity (in Erlang)
1/ page inter arrival time (in seconds)
1/ mean page duration (in seconds)
If the mean page size is L (in kbit), we have
L s
V N
3600
where
N Number of subscribers of the according service in the cell
V Data Volume per busy hour (in kbit/busy hour) per subscriber
is the page inter arrival rate
L mean page size (in kbit)
The mean length L can be obtained by the page oriented model [POM] or the ETSI model [Asp]
[ETSI], ex : 25 packets/page, mean packet length ~ 1kbyte leads to L ~ 25 kbytes)., where kbytes
have to be transformed into kbit
7
Let R be the user bit rate of a user of service k . If we assume a continuous flow of Bytes in a page
(see Figure 34, the mean transmission time (mean page duration) is
R
L
1
where
L mean page size (in kbit)
R user bit rate of user of the examined service
1/ mean page duration (in seconds)
Note that this assumption is very rough, since even for high bit rates the traffic remains bursty (see
Figure 33). As said before the model can give approximate results if we set correctly 1/.
In order to take into account the gaps between the packets during one page, one could introduce
an activity factor v
k
within the pages. But this has then also to be taken into account when deriving
L from the POM, which is not done in the current implementation of the model. Therefore, the
packet activity factor is set to v
k
=1 in the following.
7
Attention for the transformation of kbyte into kbit:
1 kbyte=1024 byte=8192 bit, wheras 1kbit=1000bit. This means that 1kbyte = 8.192 kbit
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 72/208
Page
Packet
Figure 33: Bursty packet transmission within one page
Page
Figure 34: Approximation: Continuous packet flow within one page
Therefore, we get for the traffic intensity
R
V N
3600
H
N Number of subscribers of the according service in the cell
V Data Volume per busy hour (in kbit/busy hour) per subscriber
R user bit rate of user of the examined service
H HH H traffic intensity (in Erlang)
This gives us the input parameters for the inverse Erlang C law, which we use to to find the number
C of channels that will just achieve the required service level expressed by the acceptable delay d
x%
and the probability p
delay
. to be lower than this delay.
For that, we have to do a bit of (intelligent) trial and error, meaning that we have to apply an
iterative approach. We have to find the number of channels that will just achieve the service-level. In
the first iteration step, we start with , the traffic intensity, as the number of channels. If is
fractional then the next highest integer is taken: The iteration starting value is therefore
&
C
0
=[ 1]
It has to be checked if the service level is achieved by this number of channels, if not, then the
number of channels has to be increased by one and then it has to be rechecked in the next iteration
step. The final C corresponds to the first value for which the requirements are fulfilled.
For a given value of C, we compute the probability P
w
() that a page has to wait:
8
[x] denotes the integer part of x (truncation of x)
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 73/208
1
0
!
) 1 (
!
!
) (
C
k
k C
C
w
k C C
C
P
H H H
H
H
H HH H traffic intensity (in Erlang)
C Number of available channels (to be determined)
Then, we compute the probability, that the waiting time exceeds the acceptable waiting time W
x%
.
%
) (
%
) ( ) (
x
W C
w x
e P W T P
H
H
H HH H traffic intensity (in Erlang)
C Number of available channels (to be determined)
1/ mean page duration (in seconds)
W
x%
. Acceptable waiting time in seconds
T Waiting time in seconds (variable)
The probability that the waiting time is below or equal to W
x%
.is (1-P(T> W
x%
.)
Now, the following has to be valid:
delay x
p W T P
!
%
) ( 1
W
x%
. Acceptable waiting time in seconds
T Waiting time in seconds (variable)
p
delay
required probability to be lower than the delay W
x%
.
One has to find the smallest C, for which the requirement is valid.
Please note that the process has to be performed for each packet switched service.
4.5.2.3 Number of Emitting Channels per Service as Random Variable
From the previous chapters, we know the number of accepted connections C
k
for each service k for
all circuit switched and packet switched services
9
The probability that one of these reserved channels (keep in mind that it is a virtual reservation!) is
in communication (meaning it is occupied by a user) is
9
All computations in this chapter have to be carried out for each uplink and downlink. However,
they are analougous and therefore not described twice
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 74/208
k
k k
occ
C
p
H
H HH H
k
traffic intensity (in Erlang) of service k
C
k
Number of reserved channels (communications)
p
k
occ
probability that a reserved channel is occupied by a user
Having introduced the activity factor for circuit switched services, we know that a channel which is in
communication is not necessarily emitting. We now want to derive the probability p
k
em
that a channel
of service k is emitting.
The conditional probability that a channel is emitting under the condition that it is already in
communication is equal to the activity factor v
k
:
P(channel emitting|channel in communication)= v
k
For conditional probabilities, the following is valid
) (
) (
) (
M P
M A P
M A P
For M A we get ) ( ) ( A P M A P
Since an emitting channel is also necessarily in communication, the above relation is valid.
Therefore, we get
P(emitting)=P(in communication)* P(emitting|in communication)
which means that we get
k
k
occ
k
em
p p
k
activity factor of service k
p
k
occ
probability that a reserved channel is occupied by a user
p
k
em
probability that a channel is emitting
Setting the activity factor to 1, we can apply this calculation also to the packet switched services.
In consequence of above derivations, the number B
k
of emitting channels of one service k is a
random variable:
k
C
j
k
j k
B
1
?
with _
j
k
being a random variable following the Bernoulli law:
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 75/208
k
em
k
em k
i
p
p
1 with 0
with 1
?
Since _
j
k
is Bernoulli distributed, B
k
is binomially distributed.
4.5.3 Outage Step
4.5.3.1 Uplink Load as Random Variable
If we know the number of emitting channels per service in the uplink, we can derive the cell load
and, after a few calculation steps, the minimum required received level (sensitivity) of one mobile
station of a service k at the Node B, which is the input for the cell range prediction (see [MND1] and
chapter 5)
The number of emitting channels being a random variable, the cell load gets also a random
variable. The cell load comprises contributions of all services. A statistical treatment of the cell load
therefore allows to treat the trunking efficiency coming from a multiservice environment and the
service activity. However, in order to perform the dimensioning, an according threshold has to be
defined within the cumulative distribution function of this random variable, in order to derive the
dimensioning cell load value.
The uplink cell load x
UL
is calculated in a statistical way. The first step is to treat the cell load as a
random variable:
c
UL
k
o
b
c
UL
k
o
b
R
R
UL
k
N
E
R
R
UL
k
N
E
1 k
k
UL UL
1
B f 1 x
.
.
~
Where: f
UL
other cell to same cell interference ratio for Uplink
B
k
Random variable: number of emitting channels of
service k
k
o
N
b
E
:
service k required
10
E
b
/N
0
R
k
: Service k bit rate
R
c
: Chip rate
K: Number of services
We have to compute the probability density function (pdf) and cumulative distribution function (cdf)
of
UL
x
~
. This can be done in a very elegant way using the so called probability generating
functions (see Annex and [Asp], [Prob]).
Then, the value of x
UL
is the value for which )
~
(
UL UL
x x P = H. (H to be defined by the user
accordingly, e.g. H=99%)
10
It has to be noted that the dimensioning has to be performed for one given multipath
environment, so that one E
b
/N
0
per service is valid.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 76/208
Figure 35 illustrates this procedure. If we would dimension for all the communications we derived in
the acceptance step, we would dimension at 100%, including all thinkable worst cases, which
constitutes an over-dimensioning. By accepting only 1% of outage in the outage step, the
dimensioning cell load decreases considerably, which means an enormous gain in cell range
standing against an only very small additional outage.
0
100%
C
u
m
u
l
a
t
i
v
e
d
e
n
s
i
t
y
f
u
n
c
t
i
o
n
o
f
t
h
e
t
r
a
f
f
i
c
m
i
x
99%
Cell Load X
Dimensioning point
Figure 35 Finding the dimensioning point at p=H in the cdf of the cell load (outage step)
The (1-H) represents a kind of outage probability which should be taken into account when setting
the GoS requirements (blocking, delay) in the very first step. [MND1] presents an approach to
estimate the global GoS per service taking into account both acceptance step and outage step of
the macroscopic traffic model.
4.5.3.2 Downlink Total Power as Random Variable
As the uplink cell load, the downlink transmission power P
Tot
DL
is calculated in a statistical way. The
downlink power does not only depend on the number and type of communications, but also on the
location of the according users and the fact if they are in soft handover or not. The probabilistic
impact of the users location and the shadowing (which determines the soft handover state) is
eliminated by an averaging and weighting procedure (see [MND1]) so that the transmission power
then can be given as a random variable which only depends on the number of emitting channels
per service:
k
k
k SCH CPICH
DL
Tot
P B P P P
1
~
where P
k
is the weighted transmit power share one user of service k needs to achieve its quality.
P
CPICH
and P
SCH
are the power shares of the common channels CPICH and SCH
The (discrete) probability density function (pdf) and therefore the cumulative distribution function
(cdf) of
DL
Tot
P
~
can be derived (by probability generating functions, see Appendix B, or by iteration).
Now, we have to check the probability, that
DL
Tot
P
~
stays below the maximum allowed power
)
~
(
DL
Max
DL
Tot suc
P P P p
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 77/208
This probability for a successful call (non-outage probability) must not exceed a given threshold
G% (G to be defined accordingly). It has to be noted that the outage probability (1-psuc) represents
an outage in addition to the blocking resp. delay requirements, therefore, it should be set very low
(~1%). Strictly spoken, it has to be counted when defining the blocking and delay requirements in
the very first step. [MND1] presents an approach to estimate this global GoS for each service.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 78/208
4.6 ANNEX A: Required E
b
/N
0
For Speech service
4.6.1 Speech 8 kbit/s
Environment Speed Uplink Downlink
(km/h) 1 antenna 2 antennas 1 antenna
3 7.7 5.1 6.8
6 7.9 5.2 7.1
10 8.0 5.3 7.2
Vehicular A 25 8.1 5.4 7.2
50 8.3 5.5 7.4
120 8.9 6.3 7.6
200 9.5 7.0 8.4
350 11.1 8.5 10.4
3 7.2 4.2 6.5
6 7.7 4.8 7.1
Pedestrian A 10 7.8 4.7 7.6
25 8.2 4.8 8
50 8.6 5.0 8.3
120 9.1 5.8 8.5
Table 15: Rx E
b
/N
0
required for a BER of 10
-3
in speech 8 kbps
4.6.2 Speech 12.2 kbit/s
Environment Speed Uplink Downlink
(km/h) 1 antenna 2 antennas 1 antenna
3 6.9 4.1 6.1
Vehicular A 50 7.4 4.5 6.8
120 8.1 5.2 7.2
3 6.3 3.4 6.1
Pedestrian A 50 7.9 4.2 7.9
120 8.5 5.0 8.5
Table 16: Rx E
b
/N
0
required for a BER of 10
-3
in speech 12.2 kbps
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 79/208
4.7 ANNEX B: Required E
b
/N
0
for Circuit switched services
The mention NA indicates that the result is not available yet. The symbol -- indicates that the
target BER cannot be reached for reasonable values of E
b
/N
0
.
4.7.1 CS 64 kbit/s
Environment Speed Uplink Downlink
(km/h) 1 antenna 2 antennas 1 antenna
3 5.4 2.5 5.4
Vehicular A 50 6.0 2.9 6.1
120 6.9 3.9 7.1
3 5.5 2.0 5.5
Pedestrian A 50 7.2 2.6 7.8
120 7.6 3.6 8.0
Table 17: E
b
/N
0
required for a BER of 10
-6
in CS 64 kbps
4.7.2 CS 144 kbps
Environment Speed Uplink Downlink
(km/h) 1 antenna 2 antennas 1 antenna
3 4.8 1.8 4.6
Vehicular A 50 5.4 2.2 5.4
120 6.4 3.0 6.0
3 5.4 1.3 4.5
11
Pedestrian A 50 6.8 2.4 7.6
120 7.0 2.8 --
Table 18: E
b
/N
0
required for a BER of 10
-6
in CS 144 kbps
11
For these simulations, the channel estimation was performed with the DPCCH instead of CPICH
(otherwise, the target BER could not be reached).
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 80/208
4.7.3 CS 384 kbit/s
Environment Speed Uplink Downlink
(km/h) 1 antenna 2 antennas 1 antenna
3 3.7
2
0.7 4.5
12
Vehicular A 50 5.2 1.5 5.8
120 6.6 2.2 6.5
3 NA 0.2 5.0
1
Pedestrian A 50 NA 1.8 --
120 7.3 2.3 --
Table 19: E
b
/N
0
required for a BER of 10
-6
in CS 384 kbps
12
These simulations were performed with 6 fingers for the rake receiver instead of 4 (otherwise the
target BER could not be reached). In other situations, the performance gain with 6 fingers
instead of 4 is expected to be low (~0.2 dB).
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 81/208
4.8 Annex C: Required E
b
/N
0
for Packet Switched Services
4.8.1 PS 64 kbit/s
Environment Speed Uplink Downlink
(km/h) 1 antenna 2 antennas 1 antenna
3 4.2 1.4 4.2
Vehicular A 50 4.7 1.9 4.7
120 5.6 2.8 5.1
3 3.7 0.8 3.8
Pedestrian A 50 4.9 1.5 5.4
120 5.7 2.3 6.0
Table 20: E
b
/N
0
required for a BLER of 0.1 in PS 64 kbps
4.8.2 PS 144 kbit/s
Environment Speed Uplink Downlink
(km/h) 1 antenna 2 antennas 1 antenna
3 3.5 0.8 3.5
Vehicular A 50 4.0 1.2 4.2
120 4.9 2.2 4.7
3 3.0 0.1 3.1
Pedestrian A 50 4.2 0.7 5.0
120 5.0 1.7 5.6
Table 21: E
b
/N
0
required for a BLER of 0.1 in PS 144 kbps
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 82/208
4.8.3 PS 384 kbit/s
Environment Speed Uplink Downlink
(km/h) 1 antenna 2 antennas 1 antenna
3 2.8 -0.2 3.2
Vehicular A 50 3.3 0.2 4.1
120 4.0 1.0 4.8
3 2.1 -0.8 2.7
Pedestrian A 50 3.5 -0.2 5.1
120 4.2 0.6 6.1
Table 22: E
b
/N
0
required for a BLER of 0.1 in PS 384 kbps
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 83/208
4.9 ANNEX D: Probability Generating Functions and Properties
Let X be a random variable of distribution p(x)=pdf(x) and P(t) its probability generating function
n
n
x X
t n X p dx t x p t E t P
0
) ( ) ( ) (
with the following relations:
) 1 ( ' ) 1 ( ' ) 1 ( ' '
) 1 ( '
1 ) 1 (
2 2 2
P P P X
P X E X
P
,
I
Some known probability generating functions:
Bernoulli X (p): ) 1 ( ) ( pt p t P
X
Binomial X (N,p):
N
X
pt p t P ) 1 ( ) (
Poissonian X ():
) 1 (
) (
t
X
e t P
4.9.1 Random Sum of Random Variables
Assume that X is a positive integer random variable and all Y
i
are independent identically distributed
variables (iidv). We define:
X
i
i
Y Z
1
We have the following formulas (2
nd
and 3
rd
ones derived from the first):
2
2
2 2
.
) ( ) (
X Y Y X Z
Y X Z
t P P t P
Y X Z
, , ,
4.9.2 Sum and Products
X and Y being independent variables, we have:
) ( ). ( ) (
2 2 2
t P t P t P
Y X Z
Y X Z
Y X Z
Y X Z
, , ,
2 2 2
2
2
2 2
. ) )( (
.
.
Y X Y Y X X Z
Y X Z
Y X Z
, , ,
, ,
) ( ) (
2 2 2
n
X Z
t P t P
X n Z
X n Z
nX Z
, ,
?
Let now ?s be independent Bernoulli variables of parameter p, Xs iidv.and last, N an independent
integer variable. We define:
N p p N p
N p
N
i
i
) 1 (
2 2
1
, ,
D
D
? D
2
2
2 2
1
. .
D D
D
?
, , ,
X X Z
X X N p Z
X Z
N
i
i i
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 85/208
4.10 Annex E: Derivation of Probability Density functions
We want to derive the probability density functions for the random variables uplink cell load
UL
x
~
and downlink total transmit power
DL
Tot
P
~
. They both follow the structure of the random variable
k
k
k
a B Y
1
~
where the B
k
are random variables following a binomial law and the a
k
are non-integer fixed
coefficients.
Since the derivation becomes much easier when the coefficients have integer values, we are looking
at the auxiliary variable
Y Z
~
10
~
where > is chosen in a way that all b
k
:=10
>
a
k
become integer values (->number of decimal digits!)
So now, we have a random variable
k
k
k
b B Z
1
~
The probability generating function of the binomial distributed random variable B
k
is
k
k k
C
em em B
t p p t P ) 1 ( ) (
By the help of the above described formulas, we get the generating function of the random variable
M
k
:=B
k
b
k
k k
k k
C b
em em B
t p p t P ) 1 ( ) (
Since we are summing up the M
k
to get Z
~
, we can derive the generating function of Z
~
:
K
k
C b
em em
Z
k k
k k
t p p t P
1
~ ) 1 ( ) (
This equation for ) ( ~ t P
Z
gives a polynom of t.
The definition of the probability generating function for discrete random variables is
n
n
Z
t n Z p t P
0
~ )
~
( ) (
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 86/208
Now we can get by a comparison of the polynom coefficients all probabilitiy values )
~
( n Z p , which
are equal to )
10
~
(
>
n
Y p
This gives us the (discrete) probability density function of Y
~
:
)
~
( ) ( s Y p s p
We can now derive the smallest Y, for which the following is valid:
H Y Y P )
~
(
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 87/208
5 LINK BUDGET AND I NITIAL NETWORK DESIGN
Referenced Documents
[MND1] UMTS Radio Interface Dimensioning, S. Joga, MND internal document
Related Documents
[MND2] Radio Network Dimensioning, Y. Dupuch, MND internal document
[MND3] UMTS Radio Network Dimensioning, A. Grtner and E. Salomon, MND internal document
[A955V6] A955 V6 Specification: Calculations for Link Budget Based Planning Module for UMTS, A.
Grtner, PCS internal draft
[TD1] UTRAN Link budget parameters, N. Billy, Evolium Document, Draft version,
ref. MCD/TD/SYT/NBI/200xxx
5.1 Context
The chapter gives an overview on the iterative UMTS link budget process. It is not in the scope of this
description to deliver the entire set of equations, which are described in [MND1].
We know from GSM planning that a planner has to elaborate a link budget to estimate the expected
cell radius in a given environment before starting a detailed radio network planning procedure. In
GSM, this link budget elaboration constitutes a relatively simple operation and can be performed
manually, since it is dealing purely with propagation parameters.
In UMTS, the situation gets much more complex and an iterative tool is needed to perform the cell
range analysis. This is due to the fact that in CDMA, the cell radius depends on the traffic. Taking
the uplink as an example, as the number of users or offered traffic load increases, the total noise at
the Base Station increases. Interference from other users in CDMA can be thought of as noise to a
reference user. If the reference user is already using the maximum allowed power on the uplink, too
many users at the cell will cause the reference users signal to be received with an insufficient margin
above the noise level at the Base Station. This phenomenon leads to the reference user no longer
being covered by the Base Station, or in essence, a reduction in the coverage area of a cell. This
dependence of the cell coverage radius on the loading can lead to an iterative procedure to balance
the coverage radius with the offered traffic.
5.2 Multiservice link budget
The link budget is a key element in the dimensioning process. It is used to derive the maximum
allowable path loss and therefore the cell radius. This section introduces the concept implemented in
the tool AIRMUST [MND1] that allows to analyze and to bring a solution for the Uplink and
Downlink. Both uplink and downlink analysis will result in a cell range value. The final cell range of
the overall process is the smaller of the two. If this is the uplink range, the system is uplink limited, if
its the downlink range, the system is downlink limited.
For the dimensioning, a completely homogenous network with a hexagonal cell structure, a
homogenous morphostructure, flat topographical environment and homogenous user distribution
are assumed. Therefore, one cell is representative for the whole network, meaning that all
parameters are valid for all cells. However, impact from other cells (interference, soft handover) is
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 88/208
taken into account.
In the following, both the uplink iteration process and the downlink iteration process are described
as an overview. If the reader is interested in the equations behind each step, he should refer to
[MND1].
5.2.1 Uplink Analysis
A link budget is conventionally performed for one mobile located at the edge of the cell and
therefore transmitting at maximal power. Since in a multiservice environment, there are different
types of mobiles with different service characteristics, the link budget has to be elaborated for one
mobile of each service type.
The main target of the uplink is to figure out the increase of the interference level due to the traffic
available in the cell. The curve below shows the relation between the traffic load (in per cent) and
the interference level (noise rise in dB). The point where the interference goes to infinity is called the
pole capacity. The cell load is giving a percentage of air interface loading relational to that pole
capacity.
Interference curve
0.00
5.00
10.00
15.00
20.00
25.00
0.00 20.00 40.00 60.00 80.00 100.00
Load
Noise
rise
(dB)
Figure 36 Interference noise rise over cell load
The interference in a cell depends on the thermal noise, on narrow band and wide band
interference from another system, other users in the same cell and users from all the others cells.
The intra-cell interference perceived by a mobile in the uplink is independent of the location of the
other mobiles thanks to an effective power control, so that for the uplink link budget elaboration the
mobile distribution is not relevant.
Once the level of interference has been calculated, the next step is to calculate the maximum
allowable path loss (MAPL) in order to derive the cell radius.
For a given cell load, the uplink maximal allowable pathloss for a service i depends on its E
b
/N
0
requirements, its user bit rate and the maximal mobile transmitting power for this service. This
means that in general, one will obtain different uplink coverage ranges for the different service
types.
By adjusting the mobile transmitting power, different coverage scenarios can be achieved. Service
specific gains, losses and margins have to be integrated if not all mobiles are suffering from the
same losses and taking advantage of the same gains, and/or if different margins are applied to
different services. This can be the case e.g. for soft handover gains as well as body losses and even
penetration margins, see section 5.3.1.1 for exemplary values.
The strategy adopted in the dimensioning of the uplink is to provide one common cell boundary.
Hence depending on the type of service proposed and the volume of traffic associated, the idea is to
find the limiting service (i.e. the service which reach its maximum power capabilities) and then match
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 89/208
all the other UE power to this service limiting cell range
5.2.1.1 Uplink Iteration Process
The iteration is started by assuming an interference noise rise value within the cell of i
0dB
=3dB to be
generated by the total traffic within the cell. For this fixed value, a link budget for each service can
be calculated, assuming a reference user i of the according service transmitting with maximum UE
power (which places him virtually at the edge of the cell).
This is done by calculating according to Equation 2 the minimum required level for this service at the
Node B (sensitivity) and by applying all relevant gains, margins and losses on the maximum mobile
transmit power in order to deduce the maximum allowable path loss (MAPL), shown in Equation 3.
The sensitivity has to be calculated for a reference user i of each service k:
Sensitivity = NF + 10log(N
0
) + 10log(i
0
i
)+ 10log[(E
b
/N
0
)
k
]+ 10log(R
k
)
Equation 2: Uplink receiver sensitivity (minimum required level) for a user i using service k
Where: Sensitivity Sensitivity in dB
N
0
Thermal noise density
10log(N
0
)=-174dBm/Hz (valid at 20C equal to 293K)
k
o
N
b
E
:
service k required E
b
/N
0
(non-logarithmic figure)
Note:
kdB
o
N
b
E
=10log[(E
b
/N
0
)
k
]
R
k
: Service k bit rate
NF Node B Noise figure in dB
(NF is sometimes also referred to as noise factor. )
i
0
i
noise rise due to interference (non logarithmic figure)
Note: i
0dB
=10log(i
0
i
)
For the maximum allowable pathloss, we get:
MAPL
i
= P
k
UL
Sensitivity 5Losses - 5 Margins + 5 Gains
Equation 3: Uplink MAPL for user i using service k
where P
k
UL
is the mobile power valid for service k (in dBm) and Losses, Margins and Gains are given
in dB.
The smallest MAPL of all services is then chosen as the limiting one. (Taking this MAPL as the
dimensioning one implies that the other services wont emit at maximum power)
Applying a propagation model (e. g. the well known Hata formula), one can derive the according
cell range.
Now, for each service, the traffic (number of subscribers for each service) per cell can be deduced,
since the number of subscriber per sqkm is known. Applying the traffic model described in detail in
chapter 4 for circuit switched and packet switched services, one can derive in the acceptance step
the number of reserved channels per service as well as their occupancy probability.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 90/208
In the outage step of the traffic model, the uplink cell load x
UL
is calculated in a statistical way. The
cell load is treated as a random variable:
c
UL
k
o
b
c
UL
k
o
b
R
R
UL
k
N
E
R
R
UL
k
N
E
k
k
UL UL
B f x
. 1
.
1
~
1
Where: f
UL
other cell to same cell interference ratio for Uplink
B
k
Random variable: number of emitting channels of
service k
k
o
N
b
E
:
service k required E
b
/N
0
R
k
: Service k bit rate
R
c
: Chip rate
K: Number of services
Following the traffic model, the probability density function (pdf) and the cumulative distribution
function (cdf) of the cell load can be derived. The dimensioning point (e.g. 99%) is chosen, and the
cell load x
UL
is derived at this point out of the cdf. Please refer to chapter 4 for more details on this
process.
Once the cell load is determined, the according interference noise rise can be derived.
) . ).( (
c
UL
k
o
b
R
R
k
N
E
UL
i
o
x
i
1 1
1
Equation 4: Uplink noise rise due to interference perceived by user i of service k
Please note that the perceived interference is different for users of different services. Therefore, the
limiting service has to be detected in each iteration.
In case we have n carriers, the cell load is assumed to be divided equally between the carriers, so
that each of them treats a cell load of x
UL
/n. Since we are looking at one carrier by the equations, we
have to replace x
UL
by x
UL
/n in Equation 4.
We are now at the end of one iteration step and have to compare the interference value with the
previous value. If the difference between the values is not small enough to be in a defined
convergence interval , we have to redo the above calculations with a new interference value. In case
of convergence, the radius calculated in the last iteration step is our uplink determined cell radius,
which remains to be compared with the downlink determined radius, in order to find the limiting
one. Figure 36 visualizes the uplink iteration process.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 91/208
Assumption for
interference:
Ico=3dB
Calculate UL cell
range with Max UE
power for all services
Choose limiting cell
range
Deduce mean traffic
per cell (knowing
nb of sub/sqkm)
Application of
macroscopic traffic and
cell load calculation X
UL
(e.g.@99%)
Interference
calculation
I
c
=f(X
UL)
Comparison with
previous
interference value.
Convergence?
NO
Current cell radius
is UL cell radius
YES
Adapt I
c
Figure 37 Uplink Iteration Process
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 92/208
5.2.2 Downlink Analysis
One of the main target of the downlink analysis consists in finding the maximum number of mobile
that can be connected to the base station with a good quality of service. However, contrary to the
uplink analysis, for the downlink the position of the users has to be known, since the distance from
the base station impacts the power share allocated to the mobile and hence both intracell and
extracell interference.
5.2.2.1 Downlink Iteration Process
Intuitively, one would assume a uniform distribution of users. In the dimensioning approach, this
uniform distribution is approximated by a distribution of the users on N concentric rings around the
base station from base station (r = 0) to twice the cell radius (r = 2R), where N is currently set to 50.
Strictly, this interpretation is only valid for omni cells, however, it can be applied for sectorized cells
as an approximation.
In the following, the outline of the procedure is given:
As a starting point in the iteration, a cell range R is assumed.
If the total emitted power of the node B is known, the received power that a mobile of a certain
service j would require at a given distance r from the node B can be calculated:
) ( ) ( ) ( r b P r a r P
j tot j j
Equation 5 Required power for a mobile of service j at location r
with
) (
1
) (
) (
1
) (
& , 0
r n Attenuatio W F N r b
r f r a
m l g
j I
C
j I
C
j
j I
C
j I
C
j
G
G
G
where
f(r)
other cell to same cell interference ratio at location r for downlink
(C/I)
j
required C/I for service j
C/I depends on E
b
/N
0
in the following way, depending on SHO status (in
non-logarithmic figures:
c
DL
j
o
b
R
R
DL
j
N
E
j I
C
. for mobiles not in SHO
gain SHO
I
C
c
DL
j
o
b
R
R
DL
j
N
E
j
_
1
. for mobiles in SHO
(SHO_gain is the gain on the required E
b
/N
0
given in non-logarithmic
figures)
G GG G
orthogonality factor
N
0
Thermal Noise
F Downlink Noise Factor (non-logarithmic)
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 93/208
W
Bandwidth
and
Attenuation
g,l&m
(r) contains the pathloss attenuation according to Hata and all gains, losses and
margins
As a starting value for calculations, we can take for P
tot
the maximum available power. It has to
adapted in each iteration.
As you can see above, the required power depends on the handover status of the mobile. There a
three different states for one mobile of one service at one location r
- a mobile that is not in SHO and is linked to the Node B
- a mobile that is in SHO and is linked to the Node B as the best cell
- a mobile that is in SHO and is linked to the Node B as a secondary cell
For each location, these three states have a different probability. The probabilities depend on the
standard deviation of the shadowing and of the path loss exponent in the simplified Hata Formula
k
2
. Simulations with a uniform hexagonal network give these probabilities
Soft handover probabilities (sigma=6, k2=35.22)
0
0.2
0.4
0.6
0.8
1
0 0.5 1 1.5 2 2.5
Distance (normalized)
Probability
Probability that cell is in the
active set
Probability that cell is the
only link
Probability of SHO and
that cell is the best cell
Probability of SHO and
that cell is a secondary cell
Figure 38 Soft Handover probabilities for a standard deviation of 6 dB and for k2 = 35.22
Although our assumed cell range is R, we have to include mobiles which are physically located in
another cell (between R and 2R distance of our node B).
Weighting the resulting power values with the corresponding probabilities is resulting for a given
location in a received power per user per service. Now, we can perform an averaging over all
mobiles of each service j connected to our node B, and get a mean required power Pj for a user of
service j. (For the averaging procedure, please refer to [MND1]).
The mean transmitted power has to be calculated also for the common channels SCH and CPICH.
Since we have assumed a cell range, we can derive by our traffic model (see chapter 4) the number
of reserved channels per service as well as their occupancy probability.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 94/208
As shown in chapter 4, the total required power at the node B is a random variable:
k
k
k SCH CPICH
DL
Tot
P B P P P
1
~
where P
k
is the weighted transmit power share one user of service k needs to achieve its quality.
P
CPICH
and P
SCH
are the power shares of the common channels CPICH and SCH
This random variable can be described by its pdf and cdf.
Keep in mind that we are looking in this context only at the statistic power variations due to traffic
whereas the power variations due to propagation (shadowing, fading) are treated by margins in the
power calculations.
In the cdf (which is only valid for the assumed cell range), there are now two possibilities:
Case 1:
The 100% are reached already below the maximum allowed power (which is in general 43dBm for
one carrier). This means that the maximum available power is never required and we have still
unused power resources, so that we can increase the cell radius and start the next iteration step.
Figure 39 shows an example for this case.
0
100 %
Power in dBm
40dB (<43dB!)
cdf of DL
power
Figure 39 Example for power cdf: 100% value is reached for a value lower than the max. DL power
Case 2:
A probability value lower than 100% corresponds to the maximum allowed power. This value is
compared to a target value for this probability (e.g. 99%) which we had fixed beforehand. If the
target value is not yet reached, we redo the iteration with a smaller cell range. If the value already
converged to our target value, the current radius is our downlink radius
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 95/208
0
100 %
Power in dBm
cdf of DL
power
43dBm
75%<<99%
Figure 40 Example for power cdf: max. DL power corresponds to a value lower than 100%
In other words: we are checking if the power value at 99% is equal to our 43dBm. If not, we have to
adapt the radius accordingly and redo the iteration process until this is the case.
In the case that we have more than one carrier, we have to increase the available power
accordingly. E.g. for two carriers, we are assuming within the calculations to have an equivalent
power of 46dBm. However, the calculations change since the power for the common channels is
needed in each of the carriers, so that it has to be counted n times for n carriers.
Figure 41 shows the downlink process schematically.
If we have found the uplink radius being the limiting one, we can derive for the downlink by the
same process the actual transmit power for this radius at the 99% point (this has been done in the
exemplary link budget of chapter 5.3.5. in which you will find a total DL transmit power of 41.3
dBm, which is lower than the maximum available power of 43 dBm)
Please keep in mind that, although this procedure does not seem to be too complicate, the
equations and calculations behind are very complex. Additionally, we need as an input previous
simulative results for the soft handover probabilities and the extracell interference factor at each
examined location.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 96/208
Assumption of
cell range R
Power calculation for
one user of each service
at all 50 concentric rings
(from 0 to 2R)
Deduce the mean
power per user per
service
Calculate the cdf of the
total power P
tot
applying
the macroscopic traffic
model
Calculation of P
tot
at
99% according to
the traffic model
Adapt cell
range
P
tot
@ 99% equal
to maximum
allowed power?
Current cell range
is DL cell range
NO
YES
Figure 41 Downlink Iteration Process
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 97/208
5.3 Link Budget Parameters
5.3.1 Input Parameters for Link Budget Process
5.3.1.1 Service Inputs
5.3.1.1.1 Circuit Switched Services
The parameters characterizing a circuit switched service have been defined in detail in chapter 4.
Table 23 recalls those parameters needed as an input for the link budget process for each circuit
switched service.
Bit rate
User bit rate for the circuit connection
QoS and Radio
quality
E
b
/N
0
[dB] for uplink
E
b
/N
0
[dB] for downlink
Note that we have to chose one multipath environment for the link
budget
GoS Maximum acceptable Blocking Percentage
Microscopic Activity Factor for uplink
Activity Factor for downlink
Traffic Modelling
Parameter
Macroscopic - Number of subscribers per sqkm
- traffic intensity per subscriber (in mErlang)
respectively
- Volume in kbit per busy hour
Table 23 Description of circuit switched service parameters
In addition, we have to provide the information, if soft handover is used (this wouldnt be the case if
DSCH
13
channels are used, which is theoretically possible, even if it does not make a lot of sense for
circuit switched services). For the SHO case, we have to give the according soft handover gain.
For each service, a penetration margin and a body loss have to be defined. It is considered, that
there is no body loss with a mobile being held away from the body, which is true for most data
applications. Therefore a margin of 3 dB is taken only for speech application and 0 dB for all the
other services.
Table 24 gives a list of the required input parameters along with exemplary values for two services
(speech 12.2 kbit/s and circuit switched data 64 kbit/s)
13
DCH (Dedicated channel) means one code per connection, DSCH (Downlink Shared Channel)
means sharing of code between different connections
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 98/208
User traffic parameters
Bearer throughput (kb/s)
Traffic (speech: mErlang ; data: kbits @ BH)
Blocking probability
Subscribers
Number of subs per km2
transmission parameters
Eb/N0 (dB)
Soft handover use (DCH or DSCH mode)
DL SHO Eb/N0 gain
Penetration margin (dB)
Body loss (dB)
Activity factor (%)
Maximum mobile Tx power (dBm)
TRUE eech 12.2 TRUE CS 64
UL DL UL DL
5.7 7.8 4.2 7.1
- TRUE - TRUE
- 2.5 - 2.5
21 - 24 -
20
12.2
40 mE
2%
0
100%
202
20
64
6000 kbits
2%
3
60%
2000
Service 2 Service 3
speech 12.2 kb/s CS 64 kb/s
Table 24 Input Parameter to be given for each circuit service with exemplary values for speech 12.2
kbit/s and CS64kbit/s
5.3.1.1.2 Packet Switched Services
The parameters characterizing a packet switched service have been defined in detail in chapter 4.
recalls those parameters needed as an input for the link budget process for each packet switched
service.
Uplink: Peak User bit rate
Bit rate
Downlink: Peak User bit rate
Uplink:
E
b
/N
0
[dB] for uplink
(note: only one multipath environment is treated in the
prediction)
QoS and
Radio quality
Downlink E
b
/N
0
[dB] for downlink
(note: only one multipath environment is treated in the
prediction)
Uplink:
acceptable maximum delay time d
UL
x%
and quantile x%
(in x% of the cases, the delay has to be lower than or equal
to d
x%
.)
GoS
Downlink
acceptable maximum delay time d
DL
x%
and quantile x%
(in x% of the cases, the delay has to be lower than or equal
to d
x%
.)
Microscopic
mean packet size
mean number of packets per page
Note that in the link budget approach, these parameters are
assumed to be equal for all packet switched services.
Traffic
Modelling
Parameter
Macroscopic Data Volume per busy hour V (in kbit/busy hour) per
subscriber
Number of subscriber N per sqkm
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 99/208
In addition, the information is needed if DCH or DSCH channels
14
are used for the according
packet service. There is soft handover in DCH mode and only hard handover in DSCH mode.
User traffic parameters
Bearer throughput (kb/s)
Volume (kbits @ BH)
Delay (sec)
Quantile for delay
Subscribers
Number of subs per km2
Transmission parameters
Eb/N0 (dB)
Soft handover use (DCH or DSCH mode)
DL SHO Eb/N0 gain
Penetration margin (dB)
Body loss (dB)
Activity factor (%)
Maximum mobile Tx power (dBm)
TRUE PS 144 TRUE PS 384
UL DL UL DL
5000 15000 1340 4000
2.2 4.8 1.7 4.7
- TRUE - TRUE
- 2.5 - 2.5
24 - 24 -
0
100%
20
0
100%
384
0.5
90%
40
20
1
90%
200
Service 2
144
Service 3
PS 144 kb/s PS 384 kb/s
Table 25 Input Parameter to be given for each packet switched service with exemplary values for
PS144kbit/s and 384 kbit/s
Traffic assumption Unit Value
Packet size Bytes 1000
Number of packets per page
-
25
Table 26 Packet switched traffic model parameters (valid for all packet switched services) with typical
values
5.3.1.2 Additional traffic modeling inputs
As described in chapter 4, as an additional input, the global outage probability has to be given. In
this implementation, it is the same for uplink and downlink.
Admission control and outage QoS Unit Value
Global Outage probability % 1.00%
Figure 42 Input for Traffic Model
5.3.2 Transmission Paramet ers
Table 27 shows the radio input parameters along with typical values. Please note that the
shadowing resp. fading margin for the downlink is lower than the margin for the uplink. This is due
to the fact that the DL margin is referring to the total transmit power distributed among all mobiles.
The variance of this power around the mean value is much lower than for one specific connection,
which is quite intuitive to understand: when one mobile is in a deep fade and therefore needs more
power, there a good chances that another mobile happens to have at the same moment excellent
propagation condition and needs less power, so that the total power is not affected. Alcatel has
performed simulations to determine the according shadowing margin for a required coverage
probability. Please refer to [TD1] for a more detailed explanations on the fading margins.
14
Please refer to chapter 3 for more information on the channel structure
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 100/208
A specific CDMA parameters is the interference factor f which gives the ratio between intracell
interference and extracell interference in uplink. Note that in downlink, this factor is location
dependent. The link budget tool AIRMUST therefore also needs the simulation results for this
downlink function as an input. Another downlink relevant parameter is the orthogonality factor f
which is dependent on the selected multipath environment. This orthogonality factor is a measure for
the loss of orthogonality between the code signals in the downlink. An orthogonality factor of 0
means perfect orthogonality, an orthogonality factor of 1 means complete non-orthogonality.
Transmission parameters Unit Value
Thermal noise dBm/Hz -174
Chip rate kCh/s 3840
Shadowing standard deviation dB 8
UL shadowing margin dB 4.8
UL Rayleigh fading margin dB 1.9
UL f (I_extra / I_intra) - 0.7
DL fading margin on Total Tx Power dB 2
Orthogonality factor - 0.4
Minimum coupling loss (MCL) dB 80
Table 27 Transmission input parameter with typical values
5.3.3 UE specific parameters
Table 28 gives the mobile specific input values.
UE characteristics Unit Value
Antenna gain dB 0
Cable and connector losses dB 0
Noise factor dB 8
Table 28 UE specific input parameters with typical values
5.3.4 Node B Specific Parameters
Table 29 shows the node B specific and antenna system related parameters. Please note that the use
of an MHA (Mast Head Amplifier) reduces the global noise figure of the reception chain. Please refer
to chapter 7 for detailed explanation on the MHA use.
Node B Unit Value
Maximum Power dBm 43
Cable and Connector Losses dB 3
NodeB noise factor dB 4
MHA:
MHA use TRU
MHA Noise figure dB 2.5
MHA gain dB 15
Global receiver noise factor dB 2.80
Antenna gain :
tri-sectorised dB 17
omni dB 11
bi-sectorised dB 17
hexa-sectorised dB 20
Table 29 Node B specific input parameters with typical values
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 101/208
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 102/208
5.3.5 Exemplary Link Budget
Figure 43 presents an exemplary result of the multiservice link budget process including the services
speech (12.2 kbit/s), CS 64 kbit/s, PS 144kbit/s and PS 384 kbit/s, in urban area, using tri-
sectorized sites. The link budget is uplink limited (i.e. DL power is reduced to fit the MAPL). The lines
containing parameters which are not described in the input parameter section are explained
hereafter.
Figure 43 Exemplary Link Budget
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 103/208
The processing gain represents the ratio between chiprate and user bit rate in dB, meaning:
Processing Gain= 10log(R
c
/R
b
). It is given for UL and DL.
This line gives the mean downlink transmit power required in average for one user of the according
service. It is the result of the weighting over the power values of all user locations and all handover
states.
The downlink transmit power dedicated to the common channels SCH and CPICH. In the current
implementation, it is calculated as a percentage (15%) of the total transmitted downlink power in W,
then transferred into dBm
For the uplink, this entry gives for each service the total transmit power (in dBm) of a mobile of this
service which is located at the edge of the cell. One can detect the limiting service out of this link
budget entry, which is the one transmitting at maximum mobile power.
For the downlink, this entry gives the total base station power (in dBm) dedicated to traffic channels.
This is a pure downlink entry. It gives the total transmitted base station power in dBm including
traffic and common channels.
This line gives the total TX EIRP (meaning TX power minus cable losses plus antenna gain) for uplink
(per service for a user located at the edge of the cell) and downlink in dBm.
This line gives the result for the minimum required received level per connection per service
(sensitivity), for uplink and downlink in dBm. Please note that the sensitivity is not a fixed value in
UMTS and depends on the traffic (see sections 5.2.1.1 and 5.2.2.1).
These lines give the minimum required received level for the common channels in downlink in dBm.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 104/208
This downlink entry gives for each service the percentage of users that are in soft handover with the
examined nodeB, where this node B provides the best of all SHO links.
This downlink entry gives for each service the percentage of users that are in soft handover with the
examined nodeB, but where this node B does not provide the best of all SHO links.
This uplink entry gives the convergence result for the noise rise caused by interference.
This entry gives the uplink cell load x
UL
and the downlink cell load x
DL
(for definition of DL cell load,
please refer to [MND1]
The uplink individual load per service is given by
c
UL
k
o
b
c
UL
k
o
b
R
R
UL
k
N
E
R
R
UL
k
N
E
. 1
.
1 1 1
Equation 6: Friess Formula with MHA
with
10
10
element
NF
element
n and
10
10
element
G
element
g
where NF
element
is the noise figures in dB and G
element
is the gain in dB of the corresponding element
(note that a loss is a negative gain!). The index element can be MHA, cable (denotes cables and
connectors), DX (denotes diplexer or filter) or BS (denotes node B). If there are no diplexers or filters
in the chain, n
DX
and g
DX
are set to 1.
In case we have no MHA, the Friess Formula becomes:
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 123/208
DX cable
BS
cable
DX
cable tot
g g
n
g
n
n n
1 1
Equation 7 Friess Formula without MHA
Example:
Element Noise Figure (NF) Gain
MHA 2dB
12dB
Cable 25m
2dB -2dB
Node B (incl. ANXU)
4dB
No diplexers or filters are used in the example.
Applying the Friess Formula, we get:
Noise Figure of MHA & cable & nodeB Noise Figure of cable & node B
2.5dB 6dB
7.6 GSM and UMTS/FDD Co-location
Providers operating already a GSM system cannot afford to simply add new sites for the UMTS
system. The existing GSM sites have to be re-used. Even new operators might be confronted with
sites already equipped with base stations of another operator. However, using the same site for both
systems is far from being trivial from the RF point of view. The most challenging aspect of UMTS
Antenna Engineering is therefore to find antenna system solutions to make the co-location of UMTS
Node Bs with existing GSM BTSs possible, for both GSM 900 and GSM 1800.
7.6.1 RF Requirements
7.6.1.1 Interference Mechanism
Co-location of systems may cause interference resulting in performance degradation. In order to
minimize this performance degradation to an acceptable defined level, decoupling requirements
between the systems have to be met.
The most important interference mechanisms are:
- Transmitter noise/ spurious emissions
The transmitter noise floor or transmitter spurious of system "A" within the receive band of
system "B" causes interference of system "Bs" receiver and vice versa. This could be
avoided by increasing the stop band attenuation of system "As" antenna network in the
transmit path for the receive band of system "B", or by increasing decoupling between the
two systems, either the air decoupling or the decoupling provided by the diplexer.
- Receiver blocking
Transmit signals of system "A" are blocking the receiver of system "B" and vice versa.
Although the transmit signals of system A are received by B out-of-band (meaning not
within Bs receive band), they can lead to a desensitization if they are too strong. This
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 124/208
could be avoided by increasing the stopband (out-of-band) attenuation of system "Bs"
antenna network in the receive path for transmit frequencies of system "A", or by
increasing the decoupling between the two systems (air or diplexer decoupling).
- Intermodulation products
Intermodulation products are interfering the receivers of one or both systems. Significant
intermodulation products are generated in nonlinear devices (especially mixers and
amplifiers but also connectors), if two ore more strong signals are applied. In our case the
strong signals could be different transmit carriers either from system "A" or from system "B"
or a combination of system "As" and "Bs" transmit carriers. For the consideration within
this document, it is assumed that the TREs performance to avoid intermodulation is
already fixed. Not considered are interference mechanisms within one system, because
they occur also without co-location.
7.6.1.2 Decoupling requirements
For the co-located systems, an antenna decoupling resp. diplexer decoupling of at least 30dB can
be assumed, no matter if the decoupling is provided by single band antennas, dual band antennas
or diplexers. According to measurements [CoLoc], even side-by-side installations of single band
antennas provide this value. Therefore, only decoupling requirements exceeding 30dB are judged as
critical in the following and require adapted solutions. In the decoupling tables below, the value of
30dB is therefore indicated even if a lower decoupling value would already be sufficient. All
decoupling values are referring to an isolation between the antenna connectors. For calculation of
the required decoupling, different cases are distinguished which look at the Alcatel equipment
performance (EVOLIUM GSM and EVOLIUM UMTS) and the equipment performance according
to GSM 05.05 and 3G TS 25.104 recommendation.
TX/ RX
TRE
Feeder
TX/ RX
UMTS Node B
ANC
TRE
Antenna
connectors
Antenna system
ANC
GSM BTS
Figure 49: Decoupling Reference Point
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 125/208
7.6.1.2.1 Decoupling Requirements due to Spurious Emissions
7.6.1.2.1.1 Co-located GSM1800 and UMTS sites
The spurious emissions resp. the transmitter noise floor are most critical in case of co-located GSM
1800 UMTS sites.
The limiting factor for decoupling requirements results from the GSM 1800 transmitter noise floor,
the spurious emissions respectively, of the GSM 1800 BTS within the UMTS receive band.
There are historical reasons for that: At the time GSM 1800 was specified, no one expected an
UMTS system working in the adjacent band. Therefore, the filter requirements for the GSM 1800 BTS
are rather inadequate. According to the ETSI recommendation GSM 05.05, spurious emissions
within a bandwidth of 3 MHz in the UMTS band have to be below 30 dBm at the antenna
connector. Note: Between GSM systems 98 dBm is specified. After mapping this requirement on
3.84 MHz, which is the effective carrier bandwidth of UMTS, the maximum interference may reach
-29 dBm. This is much higher than the interference level acceptable by the UMTS Node B.
For calculation of the required decoupling, two cases are distinguished. One includes the Alcatel
EVOLIUM GSM 1800 equipment performance, the other is based on the GSM 05.05
recommendation.
Spurious emissions
ETSI: < -29 dBm
Alcatel : < -67 dBm
TX/ RX
EVOLIUM
TM
BTS 1800
ANC:
UMTS band attenuation: 40 dB
TRE-level:
TX spurious emissions:
< -27 dBm
Feeder
TX/ RX
UMTS Node B
Antenna Connection
Network
Transceiver-level
Limiting interference level:
< - 114 dBm
Antenna
connectors
Antenna system
ANC: Antenna Network Combiner
TRE: Transceiver Equipment
Figure 50: Conditions for noise / spurious emission GSM 1800 UMTS
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 126/208
To determine the decoupling requirements, an acceptable degradation of the Node B sensitivity of
0.4dB (caused by the spurious emissions) has been assumed
16
.
Equipment type ETSI specifications (GSM 05.05) Alcatel EVOLIUM GSM 1800 BTS
Spurious
emissions
(at BTS antenna
connector)
- 29 dBm TX, spurious emissions: - 27 dBm
ANC, attenuation in UMTS band: 40
dB
- 27 dBm 40 dB = - 67 dBm
Limiting
interference
level
Noise at UMTS receiver without GSM 1800 impact:
Thermal noise (-108 dBm) plus receiver noise figure (4 dB), i.e. 104 dBm
(P
noise
[dBm] = -174 dBm + System Noise Figure [dB] + 10 log (BW [Hz])
Degradation of sensitivity by 0.4 dB acceptable (level 10 dB below noise floor)
-104 dBm 10 dB = -114 dBm
Required
decoupling
- 29 dBm decoupling = -114 dBm
Decoupling = 85 dB
-67 dBm decoupling = -114 dBm
Decoupling = 47 dB
Table 34: Decoupling calculation for GSM1800 transmitter noise/ spurious emissions within UMTS
receive band.
The calculation shows that a standard antenna decoupling of 30 dB is not sufficient for co-located
GSM 1800 and UMTS systems. Additional measures have to be performed, presented later in this
document.
The spurious emissions of the UMTS node B within the GSM1800 are not critical. Therefore, a
decoupling of 30dB from the UMTS antenna connector towards the GSM1800 antenna connector is
sufficient.
The resulting decoupling requirements are shown in Table 35.
Required decoupling
from ... to
GSM 1800
(05.05)
GSM 1800
(Alcatel)
UMTS (TS
25.104)
UMTS (Alcatel)
GSM 1800 (05.05) 85dB 85dB
GSM 1800
(Alcatel)
47dB 47dB
UMTS (TS 25.104) 30dB 30dB
UMTS (Alcatel) 30dB 30dB
Table 35 Decoupling requirements due to spurious emissions for GSM1800 UMTS co-location
Therefore, the 2 rightmost columns represent the limiting decoupling requirements.
7.6.1.2.1.2 Co-located GSM900 and UMTS sites
16
Rule of thumb:
0.1/0.2/0.4/1.0 dB degradation, if spurious level is 16/13/10/6 dB below noise floor
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 127/208
For the combination GSM 900 UMTS, 30 dB antenna decoupling is enough for transmitter noise/
spurious emission conditions.
The resulting decoupling requirements are shown in Table 36.
Required decoupling
from to
GSM 900
(05.05)
GSM 900
(Alcatel)
UMTS (TS
25.104)
UMTS (Alcatel)
GSM 900 (05.05) 30 dB
(1)
30dB
(1)
GSM 900 (Alcatel) 30dB 30dB
UMTS (TS 25.104) 30dB 30dB
UMTS (Alcatel) 30dB 30dB
Table 36 Decoupling requirements due to spurious emissions for GSM 900 UMTS co-location
Note: The ANC of the EVOLIUM GSM 900 BTS provides with 65 dB attenuation in the 2 GHz band sufficient
decoupling for co-located UMTS sites. It can be assumed, that also other standard ETSI equipment with their
integrated antenna network complies with the decoupling demand, but this has to be checked.
7.6.1.3 Receiver blocking
For this interference mechanism, the receiver out-of-band blocking characteristic measured at the
antenna connector of the BTS/ Node B is very important. The minimum system decoupling
requirements are indicated in the next table:
BTS
or
Node B
TX power
Antenna Antenna
RX blocking
TX power
BTS
or
Node B
Decoupling
Figure 51: Receiver blocking, principle
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 128/208
GSM 900 (RX) GSM 1800 (RX) UMTS (RX)
Specification
according to:
GSM
05.05
Alcatel GSM
05.05
Alcatel 3G TS
25.104
Alcatel
GSM 05.05 46 dB 30 dB 61 dB 30 dB
GSM 900 (TX)
Alcatel 46 dB 30 dB 61 dB 30 dB
GSM 05.05 39 dB 30 dB 62 dB 30 dB
GSM 1800 (TX)
Alcatel 39 dB 30 dB 62 dB 30 dB
3G TS
25.104
35 dB 30 dB 43 dB 30 dB
UMTS (TX)
Alcatel 35 dB 30 dB 43 dB 30 dB
It is assumed, that the decoupling provided by the antenna/diplexer system is at least 30 dB. In fact,
using Alcatel EVOLIUM equipment requires for certain combinations even less isolation than stated
here.
Table 37: Decoupling requirements
The significant improvement of the Alcatel EVOLIUM equipment results from the integrated
antenna network filters.
Link budget examples in the following sub-chapters give an overview about the relation between
antenna decoupling and the blocking level.
7.6.1.3.1 Receiver blocking between GSM 1800 and UMTS
Link budget Value
GSM 1800 TX output power (high power) 46.7 dBm
Assumed antenna decoupling - 30 dB
Assumed feeder and connector loss 0 dB
UMTS received power (@ 1800 MHz) 16.7 dBm
Specification ETSI Alcatel
UMTS blocking limit -15 dBm 20 dBm
Value is based on ETSI blocking limits in addition with the integrated antenna network filters of the
EVOLIUM equipment.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 129/208
Link budget Value
UMTS Node B TX output power 43.0 dBm
Assumed antenna decoupling - 30 dB
Assumed feeder and connector loss 0 dB
GSM 1800 received power (@ 2000 MHz) 13.0 dBm
Specification ETSI Alcatel
GSM 1800 blocking limit 0 dBm 25 dBm
|
|
|
|
|
\
|
= =
SF is the spreading factor of the considered DPCH on downlink.
P
t
is the transmitted power on the considered DPCH on downlink.
m i i
DPCH
m i
CPICH
i
i
Pt Ptot
SIR
SF Pt
Io Ec
P
Ptot
,
,
) (
=
Since we will compute the value from several measurements, the accuracy of the measurements
must be known to check the validity of the method.
Test scenario:
The emit power of the CPICH is fixed. A communication is established between the UE and the Node
B. Measurements of the CPICH Ec/No and the CPICH SIR are performed, while the total emit power
at the Node B is measured thanks to a power meter. This procedure is repeated for different
environments, and at different speeds. The effect of the distance from the Node B and of the
services bitrate can also be studied.
The equation above is used to calculate the value of the parameter o for each environment/speed.
11.5 Network Acceptance Procedure
Acceptance tests must be specified clearly in the contract. The metholody of testing and the
acceptance criteria must be clearly specified. This step can often be the bottleneck to obtaining the
final payments, as well as the prospect of future expansion contract.
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 201/208
Acceptance tests can be conducted on a cluster, RNC or MSC basis. The cluster-based acceptance is
preferred as this allows for independent clusters test to be completed, even though other cells on the
RNC or MSC are not ready. In general, it is also easier to pass the cluster-based acceptance tests
than RNC-based or MSC-based tests, since the cell counts are smaller. The RNS performance
during busy hours would require further investigations.
The methodology of testing must be documented clearly. The equipment used to collect data must
be calibrated and easy to set up. The equipment setup must be able to perform consistently, from
one run to another.
The acceptance criteria must be logical, specific and easy to quantify. For example, to determine
the data throughput from a cluster of cells, it may be important to clearly state the quality level
(Ec/Io), time of the day and measurement duration when collecting the field data. Subsequent data
post-processing can then filter out the relevant data and compare them against the acceptance
criteria.
Responsibility: Network planning and network optimization department
Input to NP: Existing network design, field data, acceptance criteria
Output of NP: Verifications
Task of NP: Consultancy
11.6 QoS Measurements
When the UMTS Network is in operation, its performance can be observed by measurements, and
the result of those measurements can be used to visualize and optimize network performance.
11.7 Recommended Measurement Tools for Air Interface Measurements
- UMTS Drive test tool E7476A from Agilent which supports the following measurement entities:
Primary Sync Channel Ec, Ec/Io, Eb, Eb/Io
Secondary Sync Channel Ec, Ec/Io, Eb, Eb/Io
Scrambling Code: Peak Ec, Peak Ec/Io, Peak Eb, Peak Eb/Io
Scrambling Code: Aggregate Ec, Aggregate Ec/Io, Aggregate Eb, Aggregate Eb/Io
Delay spread
Carrier Frequency Error
Time Stamp
Position
- Mobil Station Simulator or test mobile supporting the measurements as specify in 3GPP.
- AWGN generator to feed in noise in to a Node B
- Protocol Analyzer for NBAP message trace
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 202/208
11.8 Possible Measurement s
Test cases which could be planned during the set-up of a network or for existing network. These test
cases are given in the following list.
UMTS PROPAGATION
COVERAGE WITH THE PILOT AND THE SYNCHRONISATION CHANNELS
CELL SELECTION
COVERAGE IN TERMS OF SERVICE
INTERFERENCE ON ADJACENT CHANNEL
CO-SITTING WITH GSM
CODE MULTIPLEX
ORTHOGONALITY OF SCRAMBLING CODES ON DOWNLINK (INTERCELL)
ORTHOGONALITY ON SPREADING CODES ON DL (INTRACELL)
POWER CONTROL
OPEN LOOP POWER CONTROL
CLOSED LOOP POWER CONTROL
INFLUENCE OF THE PROPAGATION ENVIRONMENT
INFLUENCE OF THE UE SPEED
INFLUENCE OF THE INTERFERENCE LEVEL
SOFT HANDOVER
NEIGHBOURING CELL SEARCH
NEIGHBOURING CELL SEARCH IN CASE OF SOFT HANDOVER
NEIGHBOURING CELL SEARCH IN CASE OF SOFTER HANDOVER
SOFT HANDOVER AREA
SOFTER HANDOVER AREA
SOFT HANDOVER GAIN
SOFTER HANDOVER GAIN
INFLUENCE OF THE UE SPEED
INFLUENCE OF THE INTERFERENCE LEVEL
TUNING OF THE PARAMETERS
CAPACITY AND PERFORMANCES
PERFORMANCE IN AN UNLOADED NETWORK
CAPACITY IN A LOADED NETWORK
TEST SET OF THE DIFFERENT SERVICE BEARERS
AMR(12.2KBPS)-CODED VOICE SERVICE FOR ORIGINATING CALL
AMR(12.2KBPS)- CODED VOICE SERVICE FOR TERMINATING CALL
DATA(384KBPS) SERVICE
COMPARISON GSM/UMTS, MEASUREMENT OF THE
CPICH DETECTION AREA
CPICH DETECTION ON A LOADED CELL
UMTS COVERAGE FOR VOICE SERVICE
UMTS COVERAGE FOR VOICE ON ONE LOADED CELL
UMTS COVERAGE FOR DATA -384KBPS SERVICE
UMTS COVERAGE FOR DATA -384KBPS ON A LOADED CELL
MECHANICAL PERFORMANCE OF SOFT HANDOVER
MEASUREMENT OF THE SHO ZONES
TUNING OF THE PARAMETER HYTERISIS
TUNING OF THE PARAMETER REPORTING RANGE
TUNING OF THE PARAMETER REPORTING DEACTIVATION THRESHOLD
BEHAVIOUR OF MECHANICAL PERFORMANCE OF POWER CONTROL
INFLUENCE OF THE PROPAGATION ENVIRONMENT
INFLUENCE OF THE UE SPEED
INFLUENCE OF THE TPC STEPO SIZE
TEST OF THE DIFFERENT SERVICE BEARERS
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 203/208
AMR(12.2KBPS)-CODED VOICE SERVICE FOR ORIGINATING CALL
AMR(12.2KBPS)-CODED VOICE SERVICE FOR TERMINATING CALL
DATA(384KBPS) SERVICE
COMPARISON GSM/UMTS
MEASUREMENT OF THE CPICH DETECTION AREA
MEASUREMENT OF THE CPICH DETECTION ON A LOADED CELL
MEASUREMENT OF THE UMTS COVERAGE FOR VOICE SERVICE
MEASUREMENT OF THE UMTS COVERAGE FOR VOICE ON ONE LOADED CELL
MEASUREMENT OF THE UMTS COVERAGE FOR DATA-384KBPS SERVICE
MEASUREMENT OF THE UMTS COVERAGE FOR DATA-384KBPS ON A LOADED CELL
MECHANICAL PERFORMANCE OF SOFT HANDOVER
MEASUREMENT OF THE SHO ZONES
TUNING OF THE PARAMETER HYSTERESIS
TUNING OF THE PARAMETER REPORTING RANGE
TUNING OF THE PARAMETER REPORTING DEACTIVATION THRESHOLD
BEHAVIOUR AND MECHANICAL PERFORMANCE OF POWER CONTROL
INFLUENCE OF THE PROPAGATION ENVIRONMENT
INFLUENCE OF THE MOBILE SPEED
INFLUENCE OF THE TPC STEP SIZE
CHARACTERISATION OF SOFT HANDOVER DL GAIN
REFERENCE TEST WITH NO SHO
INFLUENCE OF THE PROPAGATION ENVIRONMENT WITH ACTIVATED SHO
INFLUENCE OF THE MOBILE SPEED WITH ACTIVATED SHO
CHARACTERISATION OF SOFTER HANDOVER DL GAIN
INFLUENCE OF THE PROPAGATION ENVIRONMENT WITH ACTIVATED SHO
INFLUENCE OF THE MOBILE SPEED WITH ACTIVATED SHO
VARIATION OF SOFT HANDOVER RATE IN FUNCTION OF TILT
INFLUENCE OF THE TILT ON SHO AREA
IMPACT OF PROPAGATION ON SENSITIVITY
UE SENSIBILITY FOR VOICE WITHOUT INTERFERENCE
UE SENSIBILITY FOR DATA 384KBPS WITHOUT INTERFERENCE
UE SENSIBILITY FOR VOICE WITH INTERFERENCE
UE SENSIBILITY FOR DATA 384KBPS WITH INTERFERENCE
CHARACTERISATION OF POWER IN DL
POWER ON DL FOR VOICE ON AN UNLOADED CELL
POWER ON DL FOR DATA-384KBPS ON AN UNLOADED CELL
POWER ON DL FOR VOICE ON A LOADED CELL
POWER ON DL FOR DATA-384KBPS ON A LOADED CELL
TEST SET: ACCESSIBILITY AND FILE TRANSFER
RESOURCE ALLOCATION FOR DATA(384KBPS) SERVICE
END-TO-END DELAY FOR DATA(384KBPS) SERVICE
DATA SERVICES
FILE TRANSFER
WEB AND WAP
MAILING SERVICES
STREAMING AUDIO/VIDEO
CHAT , ICQ , NEWS
PERFORMANCE OF TCP ON THE RADIO CHANNEL
TUNING OF MTU (MAXIMUM TRANSMISSION UNIT)
TUNING OF RECEIVER WINDOW SIZE, IN NUMBER OF MSS (MAXIMUM SEGMENT SIZE)
TUNING OF IRTO (INITIAL RETRANSMISSION TIME OUT)
PERFORMANCE OF TRAFFIC WEB
TEST SET: CONFORMANCE TESTING
UMTS TX SPURIOUS EMISSIONS
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 204/208
UMTS RX BLOCKING LEVEL
REFERENCE SENSITIVITY LEVEL
TEST SET: CO-LOCATION TESTS
ANTENNA DECOUPLING
GSM1800 REFERENCE MEASUREMENT
UMTS DISTURBANCES ON GSM1800 NETWORK
UMTS REFERENCE MEASUREMENT
DCS DISTURBANCES ON UMTS NETWORK
TEST SET: INTERFACE IU-PS BETWEEN RNS AND 3G-SGSN
UE INITIAL MESSAGE AND RAB ASSIGNMENT / RAB RELEASE
PAGING AND RAB ASSIGNMENT / RAB RELEASE
IU RELEASE REQUEST
DIRECT TRANSFER
DATA VOLUME REPORT
TEST SET: INTERFACE IU-CS BETWEEN RNS AND 3G- MSC/VLR
UE INITIAL MESSAGE AND RAB ASSIGNMENT / RAB RELEASE
PAGING AND RAB ASSIGNMENT / RAB RELEASE
IU RELEASE REQUEST
DIRECT TRANSFER
PROCEDURES FOR MOBILITY MANAGEMENT (MM) FOR CS SERVICES
MOBILITY MANAGEMENT FOR CS SERVICES: IMSI ATTACH
MOBILITY MANAGEMENT FOR CS SERVICES: IMSI DETACH
MOBILITY MANAGEMENT FOR CS SERVICES: AUTHENTICATION
MOBILITY MANAGEMENT FOR CS SERVICES: IDENTIFICATION
MOBILITY MANAGEMENT FOR CS SERVICES: TMSI REALLOCATION
MOBILITY MANAGEMENT FOR CS SERVICES: NORMAL LOCATION UPDATE
MOBILITY MANAGEMENT FOR CS SERVICES: PERIODIC LOCATION UPDATE
PROCEDURES FOR MM FOR PS SERVICES
MOBILITY MANAGEMENT FOR PS SERVICES: GPRS ATTACH
MOBILITY MANAGEMENT FOR PS SERVICES: GPRS DETACH
MOBILITY MANAGEMENT FOR PS SERVICES: AUTHENTICATION
MOBILITY MANAGEMENT FOR PS SERVICES: IDENTIFICATION
MOBILITY MANAGEMENT FOR PS SERVICES: TMSI REALLOCATION
MOBILITY MANAGEMENT FOR PS SERVICES: NORMAL ROUTING AREA UPDATE
MOBILITY MANAGEMENT FOR PS SERVICES: PERIODIC ROUTING AREA UPDATE
CALL CONTROL AND SESSION MANAGEMENT
CALL CONTROL PROCEDURES FOR CS
PDP CONTEXT ACTIVATION/DEACTIVATION
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 205/208
GLOSSARY/TERMINOLOGY
NYD Not yet defined in the current version of the document.
LIST OF ABBREVIATIONS
Explanations for all abbreviations used in 3GPP are given in [21.905]. Abbreviations used in this
document are given hereafter.
Abbreviation Full meaning
ACI Adjacent Channel Interference
ACLR Adjacent Channel Leakage Ratio
AI Acquisition Indicator
AICH Acquisition Indicator Channel
AIO All-In-One
AMR Adaptive Multirate
ANC Evolium Evolution Duplexer and Combiner Stage
ANXU Antenna Network for UMTS
AP Access Preamble
AP-AICH Access Preamble Acquisition Indicator Channel
API Access Preamble Indicator
ARQ Automatic Repeat Request
ASC Access Service Class
AWGN Additive White Gaussian Noise
BB Base Band
BCCH Broadcast Control Channel
BCH Broadcast Channel
BER Bit Error Rate
BLER Block Error Rate
BSC Base Station Controller
BSS Base Station System
BTS Base Transceiver Station
C- Control-
CA Channel Assignment
CAI Channel Assignment Indicator
CC Call Control
CCC CPCH Control Command
CCCH Common Control Channel
CCH Control Channel
CCPCH Common Control Physical Channel
CCTrCH Coded Composite Transport Channel
CD Collision Detection
CD/CA-ICH Collision Detection/Channel Assignment Indicator Channel
CDF Cumulative Density Function
CDI Collision Detection Indicator
CN Core Network
CPCH Common Packet Channel
CPICH Common Pilot Channel
CRC Cyclic Redundancy Check
CRNC Controlling Radio Network Controller
CS Circuit Switched
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 206/208
Abbreviation Full meaning
CSICH CPCH Status Indicator Channel
DC Dedicated Control (SAP)
DCA Dynamic Channel Allocation
DCCH Dedicated Control Channel
DCH Dedicated Channel
DEM Digital Elevation Model
DL Downlink
DPCCH Dedicated Physical Control Channel
DPCH Dedicated Physical Channel
DPDCH Dedicated Physical Data Channel
DRNC Drift Radio Network Controller
DS-CDMA Direct-Sequence Code Division Multiple Access
DSCH Downlink Shared Channel
DSMA-CD Digital Sense Multiple Access - Collison Detection
DTCH Dedicated Traffic Channel
DTX Discontinuous Transmission
Ec/No Received energy per chip divided by the power density in the band
EMC Electromagnetic Compatibility
ETSI European Telecommunications Standardization Institute
FACH Forward Access Channel
FAUSCH Fast Uplink Signalling Channel
FBI Feedback Information
FCS Frame Check Sequence
FDD Frequency Division Duplex
FEC Forward Error Correction
FER Frame Error Rate
FSW Frame Synchronization Word
GC General Control (SAP)
GGSN Gateway GPRS Support Node
GMSC Gateway MSC
GoS Grade of Service
GSM Global System for Mobile Communication
HLR Home Location Register
HO Handover
ICH Indicator Channel
IM Intermodulation
ISC International Switching Centre
ISCP Interference Signal Code Power
ITU International Telecommunication Union
kbps kilo-bits per second
L1 Layer 1 (physical layer)
L2 Layer 2 (data link layer)
L3 Layer 3 (network layer)
LAC Link Access Control
LAI Location Area Identity
LNA Low Noise Amplifier
MAC Medium Access Control
MBS Multi-Standard Base Station
Mcps Mega Chip Per Second
MHA Mast Head Amplifier
MM Mobility Management
MND Mobile Network Design (Department within MCD)
MS Mobile Station
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 207/208
Abbreviation Full meaning
MSC A 2 generation Mobile Switching Center only supporting the A interface
MUI Mobile User Identifier
OCCCH ODMA Common Control Channel
ODCCH ODMA Dedicated Control Channel
ODCH ODMA Dedicated Channel
ODMA Opportunity Driven Multiple Access
ODMA Opportunity Driven Multiple Access
ODTCH ODMA Dedicated Traffic Channel
ORACH ODMA Random Access Channel
OVSF Orthogonal Variable Spreading Factor (codes)
PC Power control
PCCH Paging Control Channel
PCCPCH Primary Common Control Physical Channel
PCH Paging Channel
PCPCH Physical Common Packet Channel
PCS Professional Customer Services (Department within MCD)
PDF Probability Density Function
PDSCH Physical Downlink Shared Channel
PDU Protocol Data Unit
PHY Physical layer
PhyCH Physical Channels
PI Paging Indication
PICH Page Indicator Channel
PMP Point to Multipoint
POM Page Oriented Model
PRACH Physical Random Access Channel
PS Packet Switched
PSC Primary Synchronisation Code
PSTN Public Switched Telephone Network
QoS Quality of Service
QPSK Quaternary Phase Shift Keying
RACH Random Access Channel
RF Radio Frequency
RL Radio Link
RLC Radio Link Control
RNC Radio Network Controller
RNS Radio Network Subsystem
RNTI Radio Network Temporary Identity
RRC Radio Resource Control
RSCP Received Signal Code Power
RSSI Received Signal Strength Indicator
RX Receive
SAP Service Access Point
SCCC Serial Concatenated Convolutional Code
SCCH Synchronisation Control Channel
SCCPCH Secondary Common Control Physical Channel
SCH Synchronisation Channel
SDU Service Data Unit
SF Spreading Factor
SFN System Frame Number
SGSN Serving GPRS Support Node
SI Status Indicator
SIR Signal-to-Interference Ratio
ED 01 RELEASED CONFIDENTIAL 23-Feb-2001
MCD UMTS_RNP_Guideline_ed01.doc 3DF 00902 UA10 VAZZA 208/208
Abbreviation Full meaning
SRNC Serving Radio Network Controller
SRNS Serving Radio Network Subsystem
SSC Secondary Synchronisation Code
SSDT Site Selection Diversity TPC
STTD Space Time Transmit Diversity
TBD To be defined
TCH Traffic Channel
TDD Time Division Duplex
TDMA Time Division Multiple Access
TFCI Transport Format Combination Indicator
TFI Transport Format Indicator
TMA Tower Mounted Amplifier
TMSI Temporary Mobile Subscriber Identity
TPC Transmit Power Control
TSTD Time Switched Transmit Diversity
TX Transmit
U- User-
UE User Equipment
UE/MS A terminal that supports USIM, SIM, the Uu interface and the Um interface
UER User Equipment with ODMA relay operation enabled
UL Uplink
UMTS Universal Mobile Telecommunications System
URA UTRAN Registration Area
USIM UMTS Subscriber Identity Module
UTRA UMTS Terrestrial Radio Access
UTRAN UMTS Terrestrial Radio Access Network
Uu UMTS Air Interface
VLR Visitor Location Register
VSWR Voltage Standing Wave Ratio
WCDMA Wide-band Code Division Multiple Access
List of Figures & List of Tables (TBD)
Index (TBD)
END OF DOCUMENT