Professional Documents
Culture Documents
WCDMA Overview
16/09/2008
Confidential
Presented by:
Simeon Kimoliatis
simeonk@digi.com.my
014-6690395
CONFIDENTIAL
WCDMA/UMTS Applications/Functions
CONFIDENTIAL
MGW PSTN/Legacy/
External
MSC GMSC
Iu-cs D C
AuC
RNS F
H
TE R MT Uu Node B Iub RNC Iu-cs
MGW
Iur EIR HLR
Gs
TE R MT Uu Node B Iub RNC Iu-ps
Gf
Gr
Gc
Iu-ps
SGSN Multimedia IP
Gn GGSN Gi Networks
Mobility management
Roaming: The MSC Server supports mobility management in order to enable
attachment/detachment and roaming within the UMTS network, between UMTS
networks, and between UMTS and GSM networks.
Handover: The MSC Server supports intra-MSC SRNS relocation, inter-MSC
and intra-MSC handover from UMTS to GSM
Security
Subscriber authentication, Key agreement, Ciphering, Data integrity, Negotiation
of algorithm
Charging
CONFIDENTIAL
Echo cancellation
Echo cancellers are provided to attenuate echo generated at the conversion
between the 4-wire and 2-wire transmissions in the PSTN and acoustic echo
generated in the user equipment.
Tone handling
Devices are provided to send and receive DTMF tones as requested by push-
button signals originating in the user equipment. Devices are provided for
sending tones such as ringing tones and busy tones, to the mobile subscriber.
Conference Calls
The Conference Call Device (CCD) is provided for bridging multiparty calls.
Announcement machine
Announcement Service Terminals (AST) are provided to make announcements
to end-users.
CONFIDENTIAL
SGSN Server
Session management:
SGSN functionality for session management is responsible for establishment, maintenance
and release of end user PDP contexts.
This includes inter-working with the GGSNs for IP address allocation if dynamic IP
addresses are used.
Session management also includes functionality for establishment and release of WCDMA
Radio Access Bearers (RAB) for end user IP data transportation.
Mobility management:
Functionality supports intersystem handover within and roaming between mobile networks
Subscriber data management:
SGSN supports the standardized interface to the HLR for management of end user
subscriber data such as International Mobile Subscriber Identity (IMSI), Access Point
Names, Subscribed QoS etc.
Security:
It includes subscriber authentication for attach/detach and location update procedures.
CONFIDENTIAL
The Admission Control function also includes a control of the MS requested QoS profile against the
subscribed QoS profile.
GGSN Server
GGSN FUNCTIONALITY
The main functions of the GGSN are as follows:
Session and Mobility management
- The GGSN handles establishment, maintenance and release of PDP contexts
that are initiated on request by an SGSN.
- The GGSN includes functionality for intra-PLMN and inter-PLMN routing of IP
packets.
IP address allocation
- The GGSN is responsible for allocation of dynamic IP addresses.
- The GGSN can either allocate the IP addresses itself, or interact with
a RADIUS server for end user authentication and retrieval of IP
addresses.
- Dynamic address allocation enables the use of IP addresses from a
common pool of addresses.
CONFIDENTIAL
Core Interfaces
CONFIDENTIAL
The Iu interface, normally uses two parallel STM-1 links connecting the
RNC to the RNSGW in the Core Network.
The two links are configured as a redundant pair to protect against both
equipment and transmission link faults.
A core network may use the Media Gateway (M-MGw) to perform the role
specified for the RNSGW
CONFIDENTIAL
UTRAN
UMTS Terrestrial Radio Access Network
Overview
CONFIDENTIAL
UTRAN architecture
Hierarchical Architecture
UTRAN Elements:
- Radio Network Controller
- Node B (Base Station)
UTRAN consists of a set of Radio Network Subsystems (RNS)
connected to CN through Iu
Node B connects to RNC through Iub
Iur interface between RNC for soft handover
CONFIDENTIAL
RNC roles
Concerning one connection between UTRAN and one UE, the
following roles of RNC exists:
Serving RNC (SRNC) that control the connections to a UE
Drift RNC (DRNC) that lends its resources for the Serving RNC for a
particular UE
Each RNC also has the controlling role towards its Node Bs (CRNC).
One UE connected to UTRAN has one and only one SRNC
One UE may have zero, one or more DRNCs
CONFIDENTIAL
Anchoring
CONFIDENTIAL
Power Control
Power control is the most important element in DS-CDMA in particular on the
uplink.
Because many users access and use the same frequency and bandwidth at the
same time, there is a high possibility of interference between the users.
In the case where there is no power control, it may happen that an MS at the
cell edge suffers from a higher path loss than another MS that is close to the
RBS. If there were no mechanism for the MSs to be power controlled to the
same level at the base station, the MS that is closer to the base station could
easily over shout the other MS and block a large part of the cell giving rise to the
so-called ‘near-far problem’.
In order to maintain good capacity levels in the network, the signals received by
the RBS, no matter where the MSs are transmitting from (that is near or far)
should be of equal power assuming that all MSs are transmitting at the same
user bit rate.
CONFIDENTIAL
SIR = (RSCP/RTWP)*SF
Since these terms are normally expressed in dB:
SIR = RSCP – RTWP + 10logSF
SIR = (RSCP/ISCP)*SF/2
Where:
RSCP = Received Signal Code Power
SF = The spreading factor of the DPCCH
ISCP = Interference Signal Code Power
- ISCP is normally approximated by the RTWP (Received Total Wideband Power)
SIR = (RSCP/RTWP)*SF/2
Since these terms are normally expressed in dB:
SIR = RSCP – RTWP + 10log(SF/2)
Handover Introduction
The purpose of handover is to maintain the connection quality
while utilizing as little radio resources as possible while the UE
moves between cells.
In a Wideband Code Division Multiple Access Radio Access
Network (WCDMA RAN) system, there are several types of
handover:
Soft/Softer Handover
- When the UE is in connected mode, CELL_DCH state. It permits
"neighboring" cells to use the same frequency and the UE to have mobility
in order to keep the connection without interruption.
Inter-Frequency Handover:
- When the UE in connected mode, CELL_DCH state, is moving out of
coverage of one WCDMA RAN frequency and into coverage of another
WCDMA RAN frequency. It will cause some interruptions to the connection
(Hard HO)
Inter-Radio Access Technology (Inter-RAT) Handover
- When the UE in connected mode, CELL_DCH state, is moving out from
WCDMA RAN coverage into an area where only GSM/GPRS coverage
exist. It will cause some interruptions to the connection (Hard HO)
CONFIDENTIAL
Handover Introduction
(entities involved during the reporting, evaluation, and execution phases)
SHO_Eval: Soft/Softer Handover
Entities Involved in Reporting, evaluation algorithm.
Evaluation, and Execution of IFHO_Eval: Inter-Frequency
Handover-Related Functions. Handover evaluation algorithm.
IRATHO_Eval: Inter-RAT
Handover (WCDMA RAN to
GSM/GPRS) evaluation algorithm.
SBHO_Eval: Service Based
Handover (WCDMA RAN to GSM
for speech users only) evaluation
algorithm, as a particular case of
IRATHO algorithm.
IRATCC_Eval: Inter-RAT Cell
Change (WCDMA RAN to
GSM/GPRS) evaluation algorithm.
CNHHO_Eval: Hard Handover via
Core Network evaluation
algorithm.
HSCC_Eval: HS-DSCH Cell
Change evaluation algorithm.
Meas_Handl: Measurement
handling algorithm.
UE_Meas_Eval: UE measurement
evaluation algorithm (working in
the UE)..
CONFIDENTIAL
Congestion Control
The Congestion Control function is responsible for detecting and resolving
overload situations on certain dedicated monitored resources.
These overload situations can, for example, occur due to fluctuations in the radio
conditions for the individual users.
Overload is resolved by a combination of blocking additional admission requests
in a cell and issuing congestion resolve actions towards individual users
- for example: switching packet users to lower rates, and releasing connections
CONFIDENTIAL
Bearer Characteristics
DOCUMENTTYPE 1 (1)
Mobile Phones
TypeYourNameHere TypeDateHere
Types of bearer
As the bearer is passing through the network elements, we need to control its
activities.
One network element must be capable of sending and receiving messages to
other network elements (Node B to RNC, RNC to CN and RNC to RNC).
This is called signaling.
Standardized signaling protocols specify how two pieces of equipment can
communicate and understand messages.
The figure below illustrates the user plane information between the terminal and
the core network through the network by use of the RAB.
CONFIDENTIAL
UMTS Planes
Transport plane protocols:
Transport plane provides the means how the physical connection
is established between the User Equipment (UE) and the network.
Provides a reliable connection between two end nodes. Is
responsible for the transport of higher layer data
User plane protocols:
Protocols implementing the radio access bearer service carrying
user data through the access stratum (parallel layers).
Control plane protocols:
Protocols for controlling the radio bearers and the connection
between the User Equipment (UE) and the network from different
aspects (including requesting the service, controlling different
transmission resources, handover, and so on).
CONFIDENTIAL
Transport Plane
Iu-PS, Iu-CS, Iur, & Iub:
control data
Iu-CS, Iu-PS, Iur, Iub
user data user data
Iu-CS, Iur, Iub Iu-PS
AAL2 AAL5
Service: Service:
• Variable bit rate • Variable bit rate
• Source & destination • Source & destination
synchronised not synchronised
• connection orientated • connection orientated
ATM
Physical Layer
Iub Interface:
CONFIDENTIAL
Transport Plane
RAN - ATM
Control Plane
Iur Interface:
interfaces & - Communication Control Ports
- Node B Control Ports
Transport Plane
- ATM
User Plane
Functions - RACH/FACH/DCH Data Ports
forming UE Context(s)
Control Plane
- SCCP over CCS7
User Plane
Summary Procedures
- Radio Link (RL) Setup
- Frame Protocols for Dedicated
Channels over ATM
- RL Reconfiguration
Procedures Iu Interface for CN Circuit Domain:
- RL Addition
- Radio Link (RL) Setup Transport Plane
- RL Deletion
- Power Control Information - RL Reconfiguration - ATM
- RL Addition Control Plane
- Handover Signalling
- RL Deletion - RANAP over CCS7
- Measurement Reports
Uu Interface: - Power Control Information User Plane
Transport Plane - Handover Signalling
- WCDMA (Wideband Code - Optimised, application-related
- Measurement Reports protocols over ATM AAL2
Division Multiple Access)
Control Plane BS RNC Procedures
- DPDCH and DPCCH Channels - Radio Access Bearer Management
User Plane - SRNC Relocation
- Optimised, application-related - Direct Transfer Procedures
protocols suitable for both (Direct Signalling between UE
packet and circuit switched and the CN Circuit Domain)
traffic
Procedures
- Radio Link (RL) Setup
- RL Reconfiguration
- RL Addition Iu Interface for CN Packet Domain:
Transport Plane
- RL Deletion
- Radio Access Bearer Mgmt
BS RNC - ATM
Control Plane
- RANAP over CCS7 or IP
User Plane
- GTP (GPRS Tunnelling
Protocol) over UDP/IP
over AAL5
BS Functions: RNC Functions: Procedures
- Modulation Radio Resource Management - Radio Access Bearer Management
- Rate Matching - Admission Control - SRNC Relocation
- Error Protection in Uu Interface - Code Allocation - Direct Transfer Procedures
- Uu Interface Channelisation - Load Control (Direct Signalling between UE
- Macro Diversity (Softer Handover) - Power Control and the CN Packet Domain)
- Handover Control (HO)
- Macro Diversity (Soft HO)
Telecommunication Management
- Radio Access Bearer (RAB)
- RAB - Radio Link Mapping
CONFIDENTIAL
UTRAN Overview
Introduction to Air-Interface
CONFIDENTIAL
UMTS-FDD Carriers
Frequency
Bandwidth W (3.84 Mchip/sec)
Gp=W/R=24.98 dB
Gp=W/R=10 dB
CONFIDENTIAL
Transmission Power
Power
High bit rate user
Frequency
Time
CONFIDENTIAL
Since the chip rate is constant, the spreading factor is low when the
bit rate is high.
One of the most important characteristics of WCDMA is the fact that
power is the common shared resource.
WCDMA Transmitter
Pre-coded
data (bits) Symbols Chips
Orthogona
l Code 1 Spread Spectrum Code
(PN Code or Gold
Data CRC FEC Inter- Code)
Channel
1
Coding Coding leaving + D/A SSC_I SSC_Q
Allows for Allows for Improves Gives a Maps Provides Gives a unique Contains Allows both
error error error unique digital bits 2x higher identity to this transmitte signals from 1:2
detection in correction correction identity to to analog data rate transmitter d Demux to share
the receiver in the in the each data signals frequency the same RF
(WCDMA,
receiver receiver stream spectrum bandwidth
0 +1 cdma2000
downlink)
1 -1
Interleaving
Interleaving ‘spreads out’ consecutive bits in time
Reduces the probability of losing consecutive bits
Convolutional encoding is sensitive to consecutive bit loss
Trades delay time for data protection
Longer interleaving periods have better data protection with more
delay
Interleaving periods:10, 20, 40, or 80 ms
Most coding schemes perform better on random data errors than
on blocks of errors.
By interleaving the data, no two adjacent bits are transmitted
near to each other, and the data errors are randomized.
CONFIDENTIAL
Channelization codes
Channelization codes are very The required bit rate - and thus
important in downlink, since they the spreading factor - of some
are used for multiplexing (at the services may change over time.
transmitter) and separating (at the The transmitter takes care of
receiver) the signals intended for changes in the spreading factor
different terminals. among others by changing the
In uplink, channelization codes are channelization code.
used for multiplexing the data and The channelization codes are
control channel (DPDCH and based on the Orthogonal
DPCCH) signals transmitted from a Variable Spreading Factor
single terminal. (OVSF) technique, which allows
In both directions, the the spreading factor to be
channelization codes are employed changed without disrupting the
for spreading the channel bits to the orthogonality between different
final chip rate of 3.84 Mchips/s. codes of different lengths
simultaneously in use.
CONFIDENTIAL
SF
Signaling 4
SF
8
SF
16
CONFIDENTIAL
Dedicated User
Channel
In the Uplink
In the Uplink
(UE Node B),
(UE Node B),
the user's data and signaling
information is separated by terminals are separated by
Channelization Codes Scrambling Codes
signaling
data
In the Downlink In the Downlink
The higher order modulations need a much better SNR because when an error occurs on
one symbol, more bits are lost.
Example: EDGE (Enhanced Data rates for GSM Evolution) uses an 8-PSK modulation scheme. It can provide data
rates up to 380 kbps, but only for users close to the base station (in a 100 m radius approximately),
Rake Receiver
CDMA uses the multipath signals and combines them to make an even stronger
signal at the receivers due to its wide bandwidth and Rake receivers
It is essentially a set of four or more receivers
One of the receivers (fingers) constantly searches for different multipath and
helps the other 3 fingers to lock into strong multipath signals which have more
than one chip delay
Each finger then demodulates the signal corresponding to a strong multipath
and then the results are combined together to make a stronger signal
Micro/Macro Diversity Combining CONFIDENTIAL
Node B
MS RAKE Summed signal
RAKE Receiver
Receiver
Node B
Active cell set
Macro Diversity Point
selection combining is used
Node B
S-RNC Core Network
Node B D-RNC
CONFIDENTIAL
Logical channels
Transport channels
Physical Frames
channels
CONFIDENTIAL
: Logical Channels
Logical Channels were created to transmit a specific content.
There are for instance logical channel to transmit the cell system information, paging
information, or user data.
Logical channels are offered as data transfer service by the Medium Access Control (MAC)
layer to the next higher layer.
Consequently, logical channels are in use between the mobile phone and the RNC.
Transport Channels (TrCH)
The MAC layer is using the transport service of the lower, Physical layer.
The MAC layer is responsible to organise the logical channel data on transport channels.
This process is called mapping. In this context, the MAC layer is also responsible to
determine the used transport format.
The transport of logical channel data takes place between the UE and the RNC.
Physical Channels (PhyCH)
The physical layer offers the transport of data to the higher layer.
The characteristics of the physical transport have to be described.
When we transmit information between the RNC and the UE, the physical medium is
changing.
Between the RNC and the Node B, where we talk about the interface Iub, the transport of
information is physically organised in so-called Frames.
Between the Node B and the UE, where we find the WCDMA radio interface Uu, the physical
transmission is described by physical channels.
A physical channel is defined by the UARFCN and the a spreading code in the FDD mode.
CONFIDENTIAL
Broadcast Channel
Paging Channel
Dedicated Channels
Dedicated Channels (Uplink/Downlink)
Dedicated Control Channel (DCCH) [Logical/L3]
Dedicated Traffic Channel (DTCH) [Logical/L3]
Dedicated Channel (DCH) [Transport/L2]
Dedicated Physical Data Channel (DPDCH)
Dedicated Physical Control Channel
(DPCCH)
Symbol Timing
Symbol consists of a number of chips
OVSF determines chips/symbol
OVSF ranges from 4 to 512 chips/symbol
(640 to 5 symbols per slot)
- AMR12.2kbps: SF=128 => 128 chips/symbol => 640/128=5 symbols/slot
- PS384kbps: SF=8 => 8 chips/symbol => 640/8=5=80 symbols/slot
CONFIDENTIAL
There is only one type of downlink dedicated physical channel, the Downlink
Dedicated Physical Channel (downlink DPCH).
Within one downlink DPCH, i.e. the dedicated transport channel (DCH), is
transmitted in time-multiplex with control information (known pilot bits, TPC
commands, and an optional TFCI).
The downlink DPCH can thus be seen as a time multiplex of a downlink DPDCH
and a downlink DPCCH.
CONFIDENTIAL
A UE is always able to find the MIB on the BCCH and to get the
scheduling information for the other SIBs
The SIBs contain all information necessary for UEs to work
properly in both Idle and Connected mode
UE timers and counters, Cell selection and reselection parameters, Common
Physical Channel parameters, Measurement parameters, Neighbor list
parameters
Contents MIB SIB1 SIB3 SIB5 SIB7 SIB11 SIB 12
PLMN identity X
Cell selection and reselection parameters X X
Paging parameters X X
Measurement management X X
Cell and common channel configuration X
Timers and counters in Idle and Connected X
mode
Power control on common channel X
LA and RA updating X
SIB Scheduling Information X
CONFIDENTIAL
DL Common control channels must be heard over the whole cell, thus
their power setting is designed for “cell edge”.
DL Common Channels does not have a power control
The power of the common physical channels are set relative to the
CPICH:
Channel Type Power Settings Activity Factor Max. Pwr(dBm) Avr. Pwr(dBm) Avr. Pwr (W) % of Tot.
P-CPICH 0 100% 33.0 33.0 2.0 10.0%
P-SCH -5 10% 31.2 21.2 0.1 0.7%
S-SCH -5 10% 29.5 19.5 0.1 0.4%
BCH -2 90% 29.9 29.4 0.9 4.4%
PICH -7 96% 26.0 25.8 0.4 1.9%
PCH -2 20% 32.6 25.6 0.4 1.8%
AICH -6 7% 27.0 15.3 0.0 0.2%
FACH-1 1 10% 34.8 24.8 0.3 1.5%
FACH-2 1 30% 34.5 29.3 0.8 4.2%
Total Power used for Control Channels from a 20W Carrier 4.2 20.9%
P-CPICH Primary Common Pilot Channel Predefined pilot sequence (15kbps, SF = 256), used for UE measurements on DL
P-SCH Primary Synch Channel 256 Chip code used for initial slot syncronisation, (256 chips out of every 2560 chip slot).
S-SCH Secondary Synch Channel Sequence of 256 chip code words, used for frame sync and SC Group ID (256 chips out of every 2560 chip slot).
P-CCPCH Primary Common Control PhysicalCarries
Channelthe BCH information (system & cell specific using MIBs & SIBs) 15ksps, SF=256. Not transmitted during first 256chips of slot.
S-CCPCH Secondary Common Control Physical
UsedChannel
to carry FACH and PCH (Only on air when information to carry)
PICH Paging Indicator Channel Carries paging indicators. (SF=256).
AICH Acquisition Indicator Channel Carries acquisition indicators to respond to RACH pre-ambles. (SF=256). (4096 chips out of 5120 chips)
CONFIDENTIAL
DL Common Control Channel:
Power Calculations example Node-B with Feeder
Huawei
Top of Ref Point Huawei Top of Node-B
Node-B Feeder at Antenna Max. Pwr(dBm) Avr. Pwr(dBm) Avr. Pwr (W) % of Tot.
Total Available Power Per Sector 20 W Loss 10.0 33.0 33.0 2.0 10.0% P-CPICH
43.0 dBm 3.0 40.0 28.0 18.0 0.1 0.3% P-SCH
28.0 18.0 0.1 0.3% S-SCH
CPICH Power 33.0 dBm 30.0 31.0 30.5 1.1 5.7% BCH
2.0 W 1.0 26.0 25.8 0.4 1.9% PICH
31.0 24.0 0.3 1.3% PCH
27.0 15.3 0.0 0.2% AICH
Common Channel Allocation Relative to CPICH Power 34.0 24.0 0.3 1.3% FACH-1
rel dB Activity Factor 34.0 28.8 0.8 3.8% FACH-2 Not Used
P-CPICH 0 100%
P-SCH -5 10% Huawei at Antenna Input
S-SCH -5 10% Max. Pwr(dBm) Avr. Pwr(dBm) Avr. Pwr (W) % of Tot.
BCH -2 90% 30.0 30.0 1.0 10.0% P-CPICH
PICH -7 96% 25.0 15.0 0.0 0.3% P-SCH
PCH -2 20% 25.0 15.0 0.0 0.3% S-SCH
AICH -6 7% 28.0 27.5 0.6 5.7% BCH
FACH-1 1 10% 23.0 22.8 0.2 1.9% PICH
FACH-2 1 30% 28.0 21.0 0.1 1.3% PCH
24.0 12.3 0.0 0.2% AICH
31.0 21.0 0.1 1.3% FACH-1
Total Power Used For Common Channels 4.2 W 2.1 31.0 25.8 0.4 3.8% FACH-2 Not Used
36.2 dBm 33.2
20.9% 20.9%
The Access Stratum architecture is new for WCDMA, and will see in a
bit more detail in the next slides
CONFIDENTIAL
UE Call States
CONFIDENTIAL
UE Call States
Idle Mode
The UE operates in Idle mode whenever it has no active CS or PS call.
UE monitors the PCH and the associated PICH. It may “sleep” between paging cycles, by disabling some of its circuitry to
improve standby time.
CELL_DCH State
The CELL_DCH state may be entered from the Idle Mode when an RRC connection is established, or when a Dedicated
Physical Channel is established from the CELL_FACH state.
PS call may operate in CELL_DCH state, especially if it is a high data transfer
CELL_FACH State
The CELL_FACH state may be entered from the Idle Mode when an RRC connection is established or from the
CELL_DCH state when directed by UTRAN to release dedicated channels
UE continuously monitors the FACH, because UTRAN can send it data or signaling at any time (no sleeping!).
CELL_PCH State
The CELL_PCH state may be entered from the CELL_FACH state, when UTRAN detects a lack of activity from the UE
during a PS call.
Similar to Idle Mode, the UE monitors the PCH and the associated PICH. It may sleep between paging cycles. If the UE
has data or signaling to send, it autonomously transitions to CELL_FACH and transmits on the RACH. The network
knows which cell is camped under and pages that cell only. UE is required to perform a cell update procedure (from
CELL_FACH) whenever its location changes to a new cell.
URA_PCH State
The URA_PCH state is similar to the CELL_PCH state, except that it is used when UTRAN detects very low activity from
the UE during a PS call and wants to limit the number of cell update procedures performed by the UE.
The UE is required to perform a URA update procedure (from CELL_FACH) whenever its location changes to a new
routing area. Because a routing area may encompass many cells, the frequency of updates is much lower than for the
CELL_PCH state. The tradeoff is that UTRAN must page the UE in all cells of the routing area, rather than in just a single
cell. [URA: UTRAN Registration Area}
Thank You
Confidential
CONFIDENTIAL
Support Slides
CONFIDENTIAL
Chc Gc j
Chd Gd
DTCH (packet mode) CPCH Data PCPCH UE
Dedicated Traffic Ch. Common Packet Ch. Coding Physical Common Packet Ch. Scrambling Uplink
Code
RF Out
PCPCH Control Part
I
Chc Gc j I+jQ Filter I/Q
Filter
Mod.
Chd,1 Gd
Q
CCTrCH DPDCH #1
Dedicated Physical Data Ch.
Chd,3 Gd
DCCH DCH Data
DPDCH #3 (optional)
Dedicated Control Ch. Dedicated Ch. Encoding
Dedicated Physical Data Ch. I
Chd,5 Gd
DTCH DCH Data
DPDCH #5 (optional)
Dedicated Traffic Ch. 1 Dedicated Ch. Encoding M Dedicated Physical Data Ch.
U Chd,2 Gd
X DPDCH #2 (optional)
Dedicated Physical Data Ch.
Chd,4 Gd
DTCH DCH Data DPDCH #4 (optional)
Dedicated Traffic Ch. N Dedicated Ch. Encoding Dedicated Physical Data Ch.
Chd,6 Gd
DPDCH #6 (optional) Q
Dedicated Physical Data Ch.
Chc Gd j
DPCCH
Pilot, TPC, TFCI bits
Dedicated Physical Control Ch.
CONFIDENTIAL
Signaling Diagrams
CONFIDENTIAL
Mobile Originating
Call Setup
[CS Services]
Figure shows
the procedure
for the Mobile
Originating Call
Setup.
The Procedure
starts with
RRC
Connection
Request and
ends with
Connect Ack.
CONFIDENTIAL
Mobile Terminating
Call Setup
[CS Services]
Figure shows
the procedure
for the Mobile
Terminating
Call Setup.
CONFIDENTIAL
Terminating SMS
The procedure
for mobile
terminated
SMS is shown
CONFIDENTIAL
RAB Establishment
(MS initiated) [PS
Services]
The UE is in PMM-
IDLE mode and
sends the Service
Request message
including RAB
Assignment to the
SGSN.
The UE shall
perform a GPRS
Attach to the SGSN
in order to obtain
access
to the GPRS
services. The
Packet Service
Attach including
PDP Context
Activation
procedure
CONFIDENTIAL
Contents
WCDMA/UMTS Network Architecture
Core Network Element Overview
UTRAN Network Element Overview
Radio Access Bearer
Introduction to Air-Interface
UMTS-FDD Carriers
Spreading & Processing Gain
DL & UL Channelization Codes
Channel Organization/Mapping in UMTS
DL Common Control Channel Power Settings
CONFIDENTIAL
Code Groups
0 0 1 2 3 4 5 6 7
1 8 9 10 11 12 13 14 15
2 16 17 18 19 20 21 22 23
Code Group No. 3 24 25 26 27 28 29 30 31
(0,1,….,63) . . . . . . . . .
Total 64 code . . . . . . . . .
Groups . . . . . . . . .
. . . . . . . . .
. . . . . . . . .
63 504 505 506 507 508 509 510 511
CONFIDENTIAL
Macro Sites
CG-3 3 24 25 26 27 28 29 30 31 c CG-40 40 320 321 322 323 324 325 326 327 a
CG-4 4 32 33 34 35 36 37 38 39 a CG-41 41 328 329 330 331 332 333 334 335 b
CG-5 5 40 41 42 43 44 45 46 47 b CG-42 42 336 337 338 339 340 341 342 343 c
CG-6 6 48 49 50 51 52 53 54 55 c CG-43 43 344 345 346 347 348 349 350 351 a
CG-7 7 56 57 58 59 60 61 62 63 a CG-44 44 352 353 354 355 356 357 358 359 b
CG-8 8 64 65 66 67 68 69 70 71 b CG-45 45 360 361 362 363 364 365 366 367 c
CG-9 9 72 73 74 75 76 77 78 79 c CG-46 46 368 369 370 371 372 373 374 375 a
CG-10 10 80 81 82 83 84 85 86 87 a CG-47 47 376 377 378 379 380 381 382 383 b
Future Expansion
CG-11 11 88 89 90 91 92 93 94 95 b CG-48 48 384 385 386 387 388 389 390 391 c
CG-12 12 96 97 98 99 100 101 102 103 c CG-49 49 392 393 394 395 396 397 398 399 a
CG-13 13 104 105 106 107 108 109 110 111 a CG-50 50 400 401 402 403 404 405 406 407 b
CG-14 14 112 113 114 115 116 117 118 119 b CG-51 51 408 409 410 411 412 413 414 415 c
CG-15 15 120 121 122 123 124 125 126 127 c CG-52 52 416 417 418 419 420 421 422 423 a
CG-16 16 128 129 130 131 132 133 134 135 a CG-53 53 424 425 426 427 428 429 430 431 b
Macro Sites
CG-17 17 136 137 138 139 140 141 142 143 b CG-54 54 432 433 434 435 436 437 438 439 c
CG-18 18 144 145 146 147 148 149 150 151 c CG-55 55 440 441 442 443 444 445 446 447
CG-19 CG-56
In Building / Microcells
19 152 153 154 155 156 157 158 159 a 56 448 449 450 451 452 453 454 455
CG-20 20 160 161 162 163 164 165 166 167 b CG-57 57 456 457 458 459 460 461 462 463
CG-21 21 168 169 170 171 172 173 174 175 c CG-58 58 464 465 466 467 468 469 470 471
CG-22 22 176 177 178 179 180 181 182 183 a CG-59 59 472 473 474 475 476 477 478 479
CG-23 23 184 185 186 187 188 189 190 191 b CG-60 60 480 481 482 483 484 485 486 487
CG-24 24 192 193 194 195 196 197 198 199 c CG-61 61 488 489 490 491 492 493 494 495
CG-25 25 200 201 202 203 204 205 206 207 a CG-62 62 496 497 498 499 500 501 502 503
CG-26 26 208 209 210 211 212 213 214 215 b CG-63 63 504 505 506 507 508 509 510 511
CG-27 27 216 217 218 219 220 221 222 223 c
CG-28 28 224 225 226 227 228 229 230 231 a
CG-29 29 232 233 234 235 236 237 238 239 b
CG-30 30 240 241 242 243 244 245 246 247 c
CG-31 31 248 249 250 251 252 253 254 255 a
CG-32 32 256 257 258 259 260 261 262 263 b
CG-33 33 264 265 266 267 268 269 270 271 c
CG-34 34 272 273 274 275 276 277 278 279 a
CG-35 35 280 281 282 283 284 285 286 287 b
CG-36 36 288 289 290 291 292 293 294 295 c
CONFIDENTIAL
R1
R2
R3
R4
R5
R6
R7
R8
CONFIDENTIAL
ReUse Pattern of 8
Polygons
Repeat same pattern
until entire area is
planned
Even though a perfect
pattern cannot be
maintained in the real
network try to maintain
code group distances to
avoid Interference
CONFIDENTIAL
Example of
KV Re-Use
Pattern of
the 8
Polygons
CONFIDENTIAL
Coding Scheme N (number of bytes) Radio Block Size Radio Block Throughput (bit/s)
CS-1 23 23*8=184 184*50=9200
CS-2 33 33*8=264 264*50=13200
CS-3 39 39*8=312 312*50=15600
CS-4 53 53*8=424 424*50=21200
Table 9. Radio Block Throughput (bits/s). Within the RLC/MAC Layer
Slides removed
CONFIDENTIAL
1. The mobile measures the received power from the Base Station.
2. The mobile read the Base Station transmit power from the broadcast
channel.
3. The mobile estimates (calculates) the minimum transmit power necessary
to access the Cell and makes an attempt at a power slightly lower.
4. If this attempt is unsuccessful that is, there is no response from the Base
Station, it will increase the power and re-try.
CONFIDENTIAL