Professional Documents
Culture Documents
Chapter 8
RACH optimization
Page 1
WCDMA RF Optimization: RACH optimization
Content
2. RACH prioritization............................................................................................... 4
Page 2
WCDMA RF Optimization: RACH optimization
1. RACH definition
Page 3
WCDMA RF Optimization: RACH optimization
2. RACH prioritization
• Preamble Signature
When monitoring the cell system information, the UE gets the information, which of
the signatures are available for use in the cell. (see IE PRACH info)
There are 8192 preamble scrambling codes, which are constructed from the long
scrambling code sequences.
The PRACH preamble scrambling codes are organised in 512 groups, with each
group holding 16 members.
There are also 512 primary scrambling codes available in UMTS, and one of them is
in use in the cell.
If the primary scrambling code s is in use in the cell, then only the PRACH preamble
scrambling codes belonging to PRACH preamble scrambling code group s can be
used for random access.
Consequently, 16 PRACH preamble scrambling codes are left, and the BCCH is
used to inform the UE, which PRACH preamble scrambling codes can be used. (see
IE PRACH info)
Page 4
WCDMA RF Optimization: RACH optimization
PRACH Preamble
UTRAN
BCCH
Pi Pi Pi Pi PRACH Preamble Scrambling Code
16 chip
• 512 groups, each with 16 preamble
256 repetitions scrambling codes
• Cell‘s primary scrambling codes associated
Preamble Signature
with preamble scrambling code group
(16 different versions)
Page 5
WCDMA RF Optimization: RACH optimization
(1)
where N, which is signaled regularly, can assume integer values from 1 to 8. A
persistence scaling-factor
Page 6
WCDMA RF Optimization: RACH optimization
(2)
where si can assume values between 0.2 and 0.9 in steps of 0.1. If the persistence
scaling factors are not signaled, a default value of one is assumed. It is also possible
to provide prioritization with less than eight classes, by signaling values for less than
six scaling factors. If, for instance, only values for s2 and s3 are signaled, then it is
assumed that si = s3 for i = 4 …7.
The persistence probability value controls the timing of RACH transmissions at the
level of radio frame intervals. When initiating RACH transmission, having received
the necessary system information for the chosen PRACH and established the
relevant Pi, the terminal draws a number r randomly between 0 and 1.
if r ≤ Pi, the physical layer PRACH transmission procedure is initiated. Otherwise, the
initiation of the transmission is deferred by 10 ms, then a new random experiment is
performed, and so on, until r ≤ Pi.
During this procedure, the terminal monitors downlink control channels for
information and takes updates of the RACH control parameters into account.
Page 7
WCDMA RF Optimization: RACH optimization
Highest priority
Second Priority (1)
Next priorities (2)
Where N=the dynamic persistence
level
Si=scaling factor
Page 8
WCDMA RF Optimization: RACH optimization
3. RACH procedure
The UTRA FDD random access algorithm is a little bit more complex than a simple
slotted ALOHA with centralized access control. Once a terminal obtains permission
to access the PRACH at MAC level (i.e., following a positive outcome of the random
experiment, as described above), the physical layer PRACH transmission procedure
is initiated. The works according to the following steps:
1. For the transmission of the first preamble, terminal picks one access signature of
those available for the given ASC and an initial preamble power level based on the
received primary CPICH power level and some correction factors. To transmit this
preamble, it picks randomly one slot out of the next set of access slots belonging to
one of the PRACH subchannels associated with the relevant ASC. The concept of
access slot sets is illustrated in Figure 4
2. The terminal then waits for the appropriate access indicator sent by the network on
the downlink
AICH access slot that is paired with the uplink access slot on which the preamble
was sent.
Sixteen tri-valued (+1, 0, -1) access indicators fir into an AICH access slot, one for
each access signature.
• If the Acquisition Indication (AI) for the relevant signature signals a positive
acknowledgement (+1), the terminal sends the message after a predefined amount of
time with a power level which is calculated from the level used to send the last
preamble.
• If the AI signals a negative acknowledgement (-1), the terminal stops with the
transmission of preambles and hands control back to the MAC After a backoff period,
which is drawn from a uniform distribution between Nmin and Nmax radio frames, the
terminal may regain access according to the MAC procedure based on persistence
probabilities.
Page 9
WCDMA RF Optimization: RACH optimization
Page 10
WCDMA RF Optimization: RACH optimization
Page 11
WCDMA RF Optimization: RACH optimization
The access slots are split between 12 RACH subchannels, hence every 12th access
slot pertains to a specific subchannel. Mapping between access slots and RACH
subchannels are shown in Table 1.
Several subchannels may be associated with any one of up to 16 different PRACHs,
similarly several or all subchannels associated with that PRACH may be used by a
particular ASC.
Table 1: The available uplink access slots for different RACH sub-channels
The 15 access slots are split into two access slots, the first eight slots are associated
with set one, the other seven with set 2, as illustrated in Figure 2. The downlink AICH
access slots are aligned with PCCPH frames whereas the uplink RACH access slots
are anticipated by τp-a chips (either 7680 or 12800 chips) respectively. The
Acquisition Indications (AI) sent on AICH slot relate to the access preambles sent on
the PRACH slot with the same slot number, leaving only τp-a – 4096 chips for round
trip propagation and processing delays. The minimum distance between two
preambles (if no acknowledgement is received on the relevant AICH slot) and the
fixed distance between preamble and message part (if positive acknowledgement is
Page 12
WCDMA RF Optimization: RACH optimization
received) measure both three access slots when τp-a = 7680 chips, or 4 access slots
when τp-a = 12800 chips. The actual distance between preambles depends also on
the subchannels available for the given ASC. If only one is available, then the
minimum distance between the preambles is 12 access slots.
Page 13
WCDMA RF Optimization: RACH optimization
The PRACH contains two sets of access slots as shown in Figure 5. Access slot set
1 contains PRACH slots 0 – 7 and starts τp-a chips before the downlink P-CCPCH
frame for which SFN mod 2 = 0. Access slot set 2 contains PRACH slots
8 - 14 and starts (τp-a –2560) chips before the downlink P-CCPCH frame for which
SFN mod 2 = 1.
Figure 5: PRACH access slot and downlink AICH relation (p-a = 7680 chips)
Page 14
WCDMA RF Optimization: RACH optimization
4. RACH optimization
The RACH optimisation is introduced in “the call setup failure “case when there’s no
ACK/NACK received by UE.
The purpose of this activity is to check the Random Access Process is working
adequately by investigating whether AI (Acquisition Indicator) has been received
through DL AICH
If AICH was not received by UE, the cause of the problem can be classified into:
RACH optimisation
No
Max UE Tx power hit To increase PRACH_Preamble_retrans
the UE_P_MAX Or PowerRampStepPRACHPreamble
Yes
Yes
Is UL Interference Report there might be an interfering
abnormally HIGH? source Nearby the serving cell
No
Page 15