You are on page 1of 135

Workshop 1

WCDMA Overview
16/09/2008

Confidential
Presented by:
Simeon Kimoliatis
simeonk@digi.com.my
014-6690395
CONFIDENTIAL

Workshop Contents [WCDMA Overview]


WCDMA/UMTS Network Architecture
Core Network Element Overview
MSC, SGSN, GGSN, Iu Interfaces
Day 1
UTRAN Network Element and Feature Overview
RNC, Node-B
Radio Access Bearer
Introduction to Air-Interface
UMTS-FDD Carriers
Spreading & Processing Gain
Spreading Factor vs. Transmit Power
WCDMA Transmitter
- Coding, Interleaving, Spreading
Day 2
- DL & UL Channelization Codes
- Scrambling Codes
- Modulation, Rake receiver
UMTS Protocol Overview
Channel Organization/Mapping in UMTS
DL Common Control Channel Power Settings
CONFIDENTIAL

WCDMA/UMTS System Objectives

Providing broad range of services


voice, video, data with variable rates, and especially multimedia
services.

High quality of service with complete security and


reliability
Easy and smoothly transition from 2G to 3G,
backwards compatibility with 2G
High spectral efficiency
Capable of roaming globally
CONFIDENTIAL

WCDMA/UMTS Applications/Functions
CONFIDENTIAL

WCDMA/UMTS Network Architecture


CONFIDENTIAL

CORE NETWORK ELEMENT OVERVIEW


The CN is responsible for switching and routing calls
and data connections to external networks.
It contains the physical entities that provide support
for the network features and telecommunications
services.
It is also responsible for providing the mobility and
location services on the highest level of the UE.
The CN handles both packet-oriented services (such
as data) and circuit-oriented services (such as
speech).
The UMTS CN can be organised into two main
domains:
CS Domain
PS Domain
CONFIDENTIAL

CORE NETWORK ELEMENT OVERVIEW (II)


CS domain
This domain offers circuit switched bearer services. The cs domain is
mainly used for real time data services, including speech and video
transmission.
The network entities MSC, GMSC and VLR can be found here.
PS domain
This domain offers packet switched bearer services. It is based on the
GSM feature GPRS.
Originally, this domain was developed for non-real time packet switched
applications, such as file transfer, email, access to the Internet. But
there are tendencies to improve its offered QoS, so that real time
services can be offered, too.
The SGSN and GGSN are located in the packet switched domain.
There are also some network elements, which are shared by the packet
switched and circuit switched domain.
The common network elements comprise the HLR, AuC and EIR.
A set of network elements were specified for application provisioning,
which can be also found in the CN.
Examples are the Camel Service Environment and WAP.
CONFIDENTIAL

WCDMA/UMTS Core Network Architecture and Interfaces

CIRCUIT SWTICHED CORE

MGW PSTN/Legacy/
External
MSC GMSC

Iu-cs D C
AuC
RNS F
H
TE R MT Uu Node B Iub RNC Iu-cs
MGW
Iur EIR HLR
Gs
TE R MT Uu Node B Iub RNC Iu-ps

Gf
Gr
Gc

Iu-ps

SGSN Multimedia IP
Gn GGSN Gi Networks

PACKET SWTICHED CORE


CONFIDENTIAL

MSC SERVER FUNCTIONALITY:


Services
Services Supported by the MSC
Teleservices
- Telephony, Emergency calls, Originating & Terminating, SMS
Bearer Services
- The MSC server supports circuit based data up to 64 kbit/s. It is also possible to
use lower bit rates.
Supplementary Services
- Examples include: Line Identification, Call Forwarding, Call Waiting and Call
Hold, Multi Party, Closed User, Group, Advice of Charge, Call Barring, Call
completion to Busy Subscriber, EMLPP (Enhanced Multi-level Precedence and
Preemption).
Unstructured Supplementary Service Data (USSD), as specified in 3GPP
IN in CAMEL
- Customized Applications for Mobile Network Enhanced Logic.
- The main application of CAMEL is the support of prepaid charging, also referred
to as real-time or on-line charging.
Positioning Service
- This service indicates the position of the mobile. Positioning is based on the
transfer of geographical coordinates stored in the MSC Server that uses the MAP
and CAP protocols. A translation is performed internally between the position of
the cell and the geographical coordinates.
CONFIDENTIAL

MSC SERVER FUNCTIONALITY:


Control Functions
Connection management
The MSC Server handles circuit-based connection management. Iu control
signaling is performed between the MSC Server and UTRAN, while the user
plane is set up via media gateways without passing the MSC Server.
In the event that tones, announcements, connection of transcoders, etc., are
required, the MSC Server orders the devices to be connected.

Mobility management
Roaming: The MSC Server supports mobility management in order to enable
attachment/detachment and roaming within the UMTS network, between UMTS
networks, and between UMTS and GSM networks.
Handover: The MSC Server supports intra-MSC SRNS relocation, inter-MSC
and intra-MSC handover from UMTS to GSM

Security
Subscriber authentication, Key agreement, Ciphering, Data integrity, Negotiation
of algorithm

Charging
CONFIDENTIAL

MSC SERVER FUNCTIONALITY:


Media Streaming
Coding/decoding
The Transcoder Unit will provide coding/decoding between UTRAN and the
UMTS circuit-based Core Network and between UTRAN and the external
network.

Echo cancellation
Echo cancellers are provided to attenuate echo generated at the conversion
between the 4-wire and 2-wire transmissions in the PSTN and acoustic echo
generated in the user equipment.

Tone handling
Devices are provided to send and receive DTMF tones as requested by push-
button signals originating in the user equipment. Devices are provided for
sending tones such as ringing tones and busy tones, to the mobile subscriber.

Conference Calls
The Conference Call Device (CCD) is provided for bridging multiparty calls.

Announcement machine
Announcement Service Terminals (AST) are provided to make announcements
to end-users.
CONFIDENTIAL

SGSN Server

The SGSN handles the communication with MSs and the


establishment of the connection between an MS and the Packet
Data Network.
It forwards IP packets between all GPRS attached MSs within that
SGSN service area and the GGSN
SGSN Main Functions
Session management
Mobility management
Subscriber data management
Security
GGSN control signaling
Charging
Admission Control
MAP and RANAP control signaling
SMS
CONFIDENTIAL

SGSN SERVER FUNCTIONALITY: Description (1)

Session management:
SGSN functionality for session management is responsible for establishment, maintenance
and release of end user PDP contexts.
This includes inter-working with the GGSNs for IP address allocation if dynamic IP
addresses are used.
Session management also includes functionality for establishment and release of WCDMA
Radio Access Bearers (RAB) for end user IP data transportation.

Mobility management:
Functionality supports intersystem handover within and roaming between mobile networks
Subscriber data management:
SGSN supports the standardized interface to the HLR for management of end user
subscriber data such as International Mobile Subscriber Identity (IMSI), Access Point
Names, Subscribed QoS etc.

Security:
It includes subscriber authentication for attach/detach and location update procedures.
CONFIDENTIAL

SGSN SERVER FUNCTIONALITY: Description (2)


GGSN control signaling:
The GTP-C protocol for control signaling between SGSN and GGSN is supported. GTP-C is transported
by UDP/IP and contains functionality for SGSN - GGSN tunnel management and control.
Charging:
SGSN supports off-line charging with generation of CDRs, and on-line charging according to CAMEL
prepaid is supported.
Admission Control:
function is handling the control of the following:
maximum number of simultaneously attached users in the SGSN
maximum bit-rate in the SGSN

The Admission Control function also includes a control of the MS requested QoS profile against the
subscribed QoS profile.

MAP and RANAP control signaling:


SGSN supports the RANAP protocol for control signaling over the RNC-SGSN interface for
establishment and release of Radio Access Bearers.
SMS:
SGSN treats SMS messages as control traffic, SMS messages can be sent as soon as a control
connection has been established and no dedicated RAB is required
CONFIDENTIAL

SGSN SERVER Interfaces


CONFIDENTIAL

GGSN Server

GGSN is effectively the gateway to external data networks.


It forwards uplink and downlink IP packets between the SGSN
and the PDN
The GGSN handles session management, that is, activation,
modification, and deactivation of PDP contexts for sessions
between the GGSN and the SGSN, and between the GGSN and
the PDN.
Session management also includes dynamic IP address allocation
and QoS negotiation.
Supports control signaling towards external IP networks for
authentication and IP address allocation,
Supports mobility within the mobile network. It communicates with
one or several SGSNs.
The GGSN provides functions for forwarding and handling user
information (IP packets) to and from external networks
(Internet/intranets).
CONFIDENTIAL

GGSN FUNCTIONALITY
The main functions of the GGSN are as follows:
Session and Mobility management
- The GGSN handles establishment, maintenance and release of PDP contexts
that are initiated on request by an SGSN.
- The GGSN includes functionality for intra-PLMN and inter-PLMN routing of IP
packets.
IP address allocation
- The GGSN is responsible for allocation of dynamic IP addresses.
- The GGSN can either allocate the IP addresses itself, or interact with
a RADIUS server for end user authentication and retrieval of IP
addresses.
- Dynamic address allocation enables the use of IP addresses from a
common pool of addresses.
CONFIDENTIAL

Core Interfaces
CONFIDENTIAL

Iuc/ps Function Key Functions


Iucs and Iups provide the control relationships between each of the
RNCs and the CS servers (MSC) and PS servers (SGSN)
For IuCS, an RNC can only be controlled by one MSC.
- One MSC can control several RNCs.
For IuPS, an RNC can only be controlled by one SGSN.
- One SGSN can control several RNCs.

The Iu interface, normally uses two parallel STM-1 links connecting the
RNC to the RNSGW in the Core Network.
The two links are configured as a redundant pair to protect against both
equipment and transmission link faults.
A core network may use the Media Gateway (M-MGw) to perform the role
specified for the RNSGW
CONFIDENTIAL

UTRAN
UMTS Terrestrial Radio Access Network

Overview
CONFIDENTIAL

UTRAN architecture

Hierarchical Architecture
UTRAN Elements:
- Radio Network Controller
- Node B (Base Station)
UTRAN consists of a set of Radio Network Subsystems (RNS)
connected to CN through Iu
Node B connects to RNC through Iub
Iur interface between RNC for soft handover
CONFIDENTIAL

RNC roles
Concerning one connection between UTRAN and one UE, the
following roles of RNC exists:
Serving RNC (SRNC) that control the connections to a UE
Drift RNC (DRNC) that lends its resources for the Serving RNC for a
particular UE
Each RNC also has the controlling role towards its Node Bs (CRNC).
One UE connected to UTRAN has one and only one SRNC
One UE may have zero, one or more DRNCs
CONFIDENTIAL

Iur Key Functions


Iur is the Interface connecting 2 RNCs
Supports Inter-RNC Mobility, Soft Handovers
Dedicated channel traffic, (user data transfer with dedicated connection)
- Allow anchoring of SRNC when UE is in Dedicated channel (DCH) state
Common channel traffic
- Allow anchoring of SRNC and also when UE is in common channel
(RACH/FACH) state
Flow control between SRNC and DRNC
• Transfer of positioning parameters between controller
• Transfer of Node B timing information between two RNCs

Huawei also supports RNC relocation.


When UE leaves SHO DRNC becomes
SRNC
It establishes a new Iu interface and the Iur
is terminated.
Iur

Anchoring
CONFIDENTIAL

RNC Key Functions

Responsible for processing of user data


Responsible for Radio Resource Management
Comparable to Base Station Controller in GSM
Key RNC Functions:
Closed loop power control
Handover control
Capacity Management (Admission & Congestion Control)
Code allocation
Packet scheduling
Macro diversity combining/splitting over number of Node Bs
CONFIDENTIAL

Node-B Key Functions

Comparable to Base Transceiver Station in GSM


Responsible for Air Interface Layer 1
Key Node B Functions:
Inner-loop power control
Modulation and spreading
RF Processing
Rate matching
Micro diversity combining/splitting inside Node B
CONFIDENTIAL

RNC & Node-B Feature Overview


Power Ctrl, Handover Ctrl, Capacity Management
CONFIDENTIAL

Power Control
Power control is the most important element in DS-CDMA in particular on the
uplink.
Because many users access and use the same frequency and bandwidth at the
same time, there is a high possibility of interference between the users.

In the case where there is no power control, it may happen that an MS at the
cell edge suffers from a higher path loss than another MS that is close to the
RBS. If there were no mechanism for the MSs to be power controlled to the
same level at the base station, the MS that is closer to the base station could
easily over shout the other MS and block a large part of the cell giving rise to the
so-called ‘near-far problem’.

In order to maintain good capacity levels in the network, the signals received by
the RBS, no matter where the MSs are transmitting from (that is near or far)
should be of equal power assuming that all MSs are transmitting at the same
user bit rate.
CONFIDENTIAL

Three types of power control


1. Open-Loop (slow) power control
2. Inner-Loop (fast) power control and
3. Outer-Loop power control
CONFIDENTIAL

Power Control Flow Chart


CONFIDENTIAL

Uplink Signal to Interference Ratio (SIR)

SIR is defined (according to 3GPP) = (RSCP/ISCP)*SF


Where:

RSCP = Received Signal Code Power


SF = The spreading factor of the DPCCH
ISCP = Interference Signal Code Power
- ISCP is normally approximated by the RTWP (Received Total Wideband
Power)

SIR = (RSCP/RTWP)*SF
Since these terms are normally expressed in dB:
SIR = RSCP – RTWP + 10logSF

To solve for RSCP:


RSCP = RTWP + SIR - 10logSF
CONFIDENTIAL

Downlink Signal to Interference Ratio (SIR)


In the downlink transmitter the bits are passed though a 1:2 de-mux

SIR = (RSCP/ISCP)*SF/2
Where:
RSCP = Received Signal Code Power
SF = The spreading factor of the DPCCH
ISCP = Interference Signal Code Power
- ISCP is normally approximated by the RTWP (Received Total Wideband Power)

SIR = (RSCP/RTWP)*SF/2
Since these terms are normally expressed in dB:
SIR = RSCP – RTWP + 10log(SF/2)

To solve for RSCP:


RSCP = RTWP + SIR - 10log2/SF
CONFIDENTIAL

Handover Introduction
The purpose of handover is to maintain the connection quality
while utilizing as little radio resources as possible while the UE
moves between cells.
In a Wideband Code Division Multiple Access Radio Access
Network (WCDMA RAN) system, there are several types of
handover:
Soft/Softer Handover
- When the UE is in connected mode, CELL_DCH state. It permits
"neighboring" cells to use the same frequency and the UE to have mobility
in order to keep the connection without interruption.
Inter-Frequency Handover:
- When the UE in connected mode, CELL_DCH state, is moving out of
coverage of one WCDMA RAN frequency and into coverage of another
WCDMA RAN frequency. It will cause some interruptions to the connection
(Hard HO)
Inter-Radio Access Technology (Inter-RAT) Handover
- When the UE in connected mode, CELL_DCH state, is moving out from
WCDMA RAN coverage into an area where only GSM/GPRS coverage
exist. It will cause some interruptions to the connection (Hard HO)
CONFIDENTIAL
Handover Introduction
(entities involved during the reporting, evaluation, and execution phases)
SHO_Eval: Soft/Softer Handover
Entities Involved in Reporting, evaluation algorithm.
Evaluation, and Execution of IFHO_Eval: Inter-Frequency
Handover-Related Functions. Handover evaluation algorithm.
IRATHO_Eval: Inter-RAT
Handover (WCDMA RAN to
GSM/GPRS) evaluation algorithm.
SBHO_Eval: Service Based
Handover (WCDMA RAN to GSM
for speech users only) evaluation
algorithm, as a particular case of
IRATHO algorithm.
IRATCC_Eval: Inter-RAT Cell
Change (WCDMA RAN to
GSM/GPRS) evaluation algorithm.
CNHHO_Eval: Hard Handover via
Core Network evaluation
algorithm.
HSCC_Eval: HS-DSCH Cell
Change evaluation algorithm.
Meas_Handl: Measurement
handling algorithm.
UE_Meas_Eval: UE measurement
evaluation algorithm (working in
the UE)..
CONFIDENTIAL

Soft/Softer Handover Basics (1)


In Soft Handover, the UE connection consists of at least two radio links
established with cells belonging to different Radio Base Stations (RBS).
In Softer handover, the UE connection consists of at least two radio
links established with cells belonging to the same RBS.
A combination of Soft and Softer Handover is also possible for a UE
connection
Data flow is not interrupted during the addition or removal of radio links.
The downlink signals, received by the UE, are combined in the RAKE
receiver; that allows for multipath reception and thereby gives
protection against fading
CONFIDENTIAL
Capacity Management Overview
WCDMA RAN Capacity Management solution controls the load in the
WCDMA cell.
This makes it possible for the system to provide the requested QoS
and coverage for individual connections.
Each cell or group of cells has its own set of Capacity Management
functions responsible for monitoring and controlling the resources of
that cell.
The Capacity Management solution consists of three main functions:
Dedicated Monitored Resource Handling
Admission Control
Congestion Control
CONFIDENTIAL

Capacity Management Overview


CONFIDENTIAL

Capacity Management Functions Overview (1)

Dedicated Monitored Resource Handling


The Dedicated Monitored Resource Handling function is responsible for keeping
track of the utilization of critical resources in the system.
The utilization of these resources provides information that is used by Admission and
Congestion Control functions to control the cell load.
- It provides information about the current usage of resources that are critical to the
load of the cell.
This is done by performing measurements and keeping track of every radio link
setup, addition, deletion, and modification in the cell.
CONFIDENTIAL

Capacity Management Functions Overview (2)


Admission Control
The Admission Control function is responsible for controlling the utilization of
dedicated monitored resources by accepting or refusing requests for usage of
these resources.
Those requests are initiated when setting up new connections, performing (soft)
handover, and reconfiguring existing connections.
The decision on accepting or refusing a request takes into account the current
load on the dedicated monitored resources and the characteristics of the request.

Congestion Control
The Congestion Control function is responsible for detecting and resolving
overload situations on certain dedicated monitored resources.
These overload situations can, for example, occur due to fluctuations in the radio
conditions for the individual users.
Overload is resolved by a combination of blocking additional admission requests
in a cell and issuing congestion resolve actions towards individual users
- for example: switching packet users to lower rates, and releasing connections
CONFIDENTIAL

What is the Bearer?


The user traffic, known as the user plane, is carried through the
network from the mobile to the core network on a bearer.
In GSM, the traffic channel was the bearer.
In UMTS, a bearer is a varied bit rate and is allocated depending on
the needs of the subscriber.
The actual data in the bearer is transparent to the network.
CONFIDENTIAL

Bearer Characteristics
DOCUMENTTYPE 1 (1)

Mobile Phones
TypeYourNameHere TypeDateHere

 Conversational class  Streaming class


 Voice and video  Streaming video

 Interactive class  Background class


 Web browsing  Mail downloading
CONFIDENTIAL

Types of bearer

A bearer has different parameters, such as variable data


rates, protection and delay.
The bearer is dependent on the service required.

Voice Audio/Video Streaming


Voice Messages Video telephony

0 8 16 32 48 64 80 96 112 128 256 384 kbit/s

Messaging WWW browsing


Transactional Intranet access
Infoservices Downloading
CONFIDENTIAL

Relationship between the RAB and Signaling Protocols

As the bearer is passing through the network elements, we need to control its
activities.
One network element must be capable of sending and receiving messages to
other network elements (Node B to RNC, RNC to CN and RNC to RNC).
This is called signaling.
Standardized signaling protocols specify how two pieces of equipment can
communicate and understand messages.
The figure below illustrates the user plane information between the terminal and
the core network through the network by use of the RAB.
CONFIDENTIAL

UMTS Planes
Transport plane protocols:
Transport plane provides the means how the physical connection
is established between the User Equipment (UE) and the network.
Provides a reliable connection between two end nodes. Is
responsible for the transport of higher layer data
User plane protocols:
Protocols implementing the radio access bearer service carrying
user data through the access stratum (parallel layers).
Control plane protocols:
Protocols for controlling the radio bearers and the connection
between the User Equipment (UE) and the network from different
aspects (including requesting the service, controlling different
transmission resources, handover, and so on).
CONFIDENTIAL
Transport Plane
Iu-PS, Iu-CS, Iur, & Iub:
control data
Iu-CS, Iu-PS, Iur, Iub
user data user data
Iu-CS, Iur, Iub Iu-PS

AAL2 AAL5
Service: Service:
• Variable bit rate • Variable bit rate
• Source & destination • Source & destination
synchronised not synchronised
• connection orientated • connection orientated

ATM

Physical Layer
Iub Interface:
CONFIDENTIAL
Transport Plane
RAN - ATM
Control Plane
Iur Interface:
interfaces & - Communication Control Ports
- Node B Control Ports
Transport Plane
- ATM
User Plane
Functions - RACH/FACH/DCH Data Ports
forming UE Context(s)
Control Plane
- SCCP over CCS7
User Plane
Summary Procedures
- Radio Link (RL) Setup
- Frame Protocols for Dedicated
Channels over ATM
- RL Reconfiguration
Procedures Iu Interface for CN Circuit Domain:
- RL Addition
- Radio Link (RL) Setup Transport Plane
- RL Deletion
- Power Control Information - RL Reconfiguration - ATM
- RL Addition Control Plane
- Handover Signalling
- RL Deletion - RANAP over CCS7
- Measurement Reports
Uu Interface: - Power Control Information User Plane
Transport Plane - Handover Signalling
- WCDMA (Wideband Code - Optimised, application-related
- Measurement Reports protocols over ATM AAL2
Division Multiple Access)
Control Plane BS RNC Procedures
- DPDCH and DPCCH Channels - Radio Access Bearer Management
User Plane - SRNC Relocation
- Optimised, application-related - Direct Transfer Procedures
protocols suitable for both (Direct Signalling between UE
packet and circuit switched and the CN Circuit Domain)
traffic
Procedures
- Radio Link (RL) Setup
- RL Reconfiguration
- RL Addition Iu Interface for CN Packet Domain:
Transport Plane
- RL Deletion
- Radio Access Bearer Mgmt
BS RNC - ATM
Control Plane
- RANAP over CCS7 or IP
User Plane
- GTP (GPRS Tunnelling
Protocol) over UDP/IP
over AAL5
BS Functions: RNC Functions: Procedures
- Modulation Radio Resource Management - Radio Access Bearer Management
- Rate Matching - Admission Control - SRNC Relocation
- Error Protection in Uu Interface - Code Allocation - Direct Transfer Procedures
- Uu Interface Channelisation - Load Control (Direct Signalling between UE
- Macro Diversity (Softer Handover) - Power Control and the CN Packet Domain)
- Handover Control (HO)
- Macro Diversity (Soft HO)
Telecommunication Management
- Radio Access Bearer (RAB)
- RAB - Radio Link Mapping
CONFIDENTIAL

UTRAN Overview
Introduction to Air-Interface
CONFIDENTIAL

UTRAN Interfaces UTRAN Definitions


RNS (Radio Network
Subsystem)
A full or partial network offering
access between UE and Core
Network
Contains one RNC
RNC (Radio Network
Controller)
Element of the RNS that
controls physical radio
resources
Node B
Logical Node controlling
transmission and reception from
one or more cells
Iub Interface
Interface between RNC and
Node B
Uu Interface
Interface between UE and Node
B
Iur Interface
Interface between one RNS and
another RNS
Iu Interface
Interface between CN and RNS
CONFIDENTIAL

WCDMA Direct Sequence CDMA (DS-CDMA)

WCDMA/UMTS uses Direct Sequence CDMA (DS-CDMA), the


information for each user is spread with a unique code.
Separate Users through different Codes
Provides large bandwidth
Provides continuous transmission and reception

CDMA is also known as a Spread Spectrum Technology.


CONFIDENTIAL

UMTS-FDD Carriers

Others Operator Carriers


Carrier 1 Carrier 2 Carrier 3
Uplink 1920 1925 1930
MHz
Downlink 2110 2115 2120

DiGi Carriers U Mobile


Uplink
Downlink
Ch.
Number
9612
10562
9637
10587
9662
10612
Carrier 1 Carrier 2 Carrier 3 Uplink 1935 1940 1945
MHz
Uplink 1965 1970 1975 Downlink 2125 2130 2135
MHz Maxis
Downlink 2155 2160 2165 Uplink Ch. 9687 9712 9737
DiGi Downlink Number 10637 10662 10687
Uplink Ch. 9837 9862 9887
Downlink Number 10787 10812 10837 Uplink 1950 1955 1960
MHz
Downlink 2140 2145 2150
Celcom
Uplink Ch. 9762 9787 9812
Downlink Number 10712 10737 10762

Ch. Number (UARFCN UL/DL = Carrier Center Freq * 5 = 2112.4*5 =10562


CONFIDENTIAL

WCDMA terminology – Bits, Symbols, & Chips

Terms: Bit, Symbol, Chip


Bit : data after source coding
Symbol: data after channel coding and interleaving
Chip: data after spreading

Processing Procedure of WCDMA System


CONFIDENTIAL

SPREADING WITH CODES


The process of spreading
A bit of information is a ‘1’ or a ‘0’ (digital) or a ‘-1’, ‘+1’ (analogue).
The user information bits are spread into a number of chips when it is
“multiplied” with the spreading code (which is unique).
- The chip rate for the system is constant 3.84 Mchip/s
- and the signal is spread into a bandwidth of 5 MHz.
The Spreading Factor (SF) is the ratio between the chip rate and the
symbol rate.
- This is equal to the spreading gain (i.e. the protection against interference).
The same code is used to dispread the information after it is sent over the
air interface, i.e. both the UE and the RBS use the same codes.

Different bit rates and Spreading Factors at a constant chip rate


CONFIDENTIAL

Spreading Factor & Processing Gain


Bit rate
R
Power density (Watts/Hz)

Unspread narrowband signal Spread wideband signal

Frequency
Bandwidth W (3.84 Mchip/sec)

R  SF  const  W  3.84 Mchip


sec
BU u
G p dB  
W
  SF
BBaerer R Gp:
BUu:
processing gain
system chip rate
BBearer: bearer symbol rate
SF: spreading factor
CONFIDENTIAL

Processing Gain Examples


Voice user (R=12,2 kbit/s)
R
Power density (W/Hz)

Gp=W/R=24.98 dB

=10log10 (3.84^6/12.2^3) • Spreading


sequences have a
different length
Frequency (Hz) • Processing gain
Packet data user (R=384 kbit/s) depends on the
R user data rate
Power density (W/Hz)

Gp=W/R=10 dB
CONFIDENTIAL

Transmission Power

To send a stream of bits, a certain power is needed.


The bit rate has a constant relationship to the power level and if
the bit rate is high, then the power level becomes high and vice
versa

Power
High bit rate user
Frequency

5MHz Low bit rate user

Time
CONFIDENTIAL

Spreading Factor vs. Power

Since the chip rate is constant, the spreading factor is low when the
bit rate is high.
One of the most important characteristics of WCDMA is the fact that
power is the common shared resource.

Imagine like a box with fix volume


• When SF Increases Power decreases
• When SF decreases Power increases
CONFIDENTIAL

Eb/No and Processing Gain


Eb/N0 (the energy per bit to noise power spectral density
ratio) is an important parameter in digital communication or
data transmission
In 3G radio network planning and system dimensioning typically
make use of the terms Eb/No and Processing Gain (PG).
defines the required and achieved carrier to interference (C/I) ratio i.e. C/I = Eb/No - PG.

Both Eb/No and PG are relatively conceptual and are not


quantities that can be measured directly.
Eb/No is provided by the equipment vendors for the Uplink and
Downlink, for the different CS and PS services and for the
different channel model types (i.e. TU3, TU50, RA50 etc)
Table below are the Eb/No values used by Huawei
Huawei's Required Eb/No (dB)
UL DL
AMR12.2 5.4 7.8
CS64 2.8 6.3
PS64 2.6 4.8
PS128 2.3 4.7
PS384 1.8 3.8
CONFIDENTIAL

Processing Gain and Eb/No Example


Processing gain is what gives CDMA systems the robustness against self-
interference that is necessary in order to reuse the available 5 MHz carrier
frequencies over geographically close distances.
Let’s take an example with real WCDMA parameters.
Speech service with a bit rate of 12.2 kbps has a processing gain of 25 dB, 10log10
(3.84e6/12.2e3).
After dispreading, the signal power needs to be typically a few decibels above the
interference and noise power.
The required power density over the interference power density after dispreading is
designated as Eb/No, where Eb is the energy, or power density, per user bit and No is
the interference and noise power density.
For speech service Eb/No is typically in the order of 7.0 dB, and the required wideband
signal-to-interference ratio is therefore 7.0 dB minus the processing gain is 18.0 dB.
In other words, the signal power can be 18 dB under the interference or thermal noise
power, and the WCDMA receiver can still detect the signal.
Processing Gain
PG=10log(chip/bit rate)
Kbps PG
12.2 25.0
64 17.8
128 14.8
384 10
CONFIDENTIAL

WCDMA Transmitter
Pre-coded
data (bits) Symbols Chips

Orthogona
l Code 1 Spread Spectrum Code
(PN Code or Gold
Data CRC FEC Inter- Code)
Channel
1
Coding Coding leaving + D/A SSC_I SSC_Q

Add CRC Channel


to Coding:
I I Pulse I
Transport Convolutional Linear Shaping
Block or Turbo Complex Filter
1:2 I/Q
Starts here Summatio Multiplie RF
Demu Modulato
n x
r
r
Out
(I + jQ) Pulse
Orthogona Q Q Q
l Code N Shaping
Filter
Data CRC FEC Inter-
Channel
N
Coding Coding leaving + D/A

Allows for Allows for Improves Gives a Maps Provides Gives a unique Contains Allows both
error error error unique digital bits 2x higher identity to this transmitte signals from 1:2
detection in correction correction identity to to analog data rate transmitter d Demux to share
the receiver in the in the each data signals frequency the same RF
(WCDMA,
receiver receiver stream spectrum bandwidth
0  +1 cdma2000
downlink)
1  -1

CRC: Cyclic Redundancy Check


FEC: Forward Error Correction
CONFIDENTIAL

Air interface: Coding, Interleaving, Spreading


The number of chips per data symbol is called the Spreading Factor (SF).
The lower the spreading factor the higher the data rate.
SF value varies in FDD from 4 to 512.
CONFIDENTIAL

WCDMA Channel Coding


During the transmission, there are many interferences and fading.
To guarantee reliable transmission, system should overcome these
through the channel coding which includes convolution and
interleaving.
Convolution that is used for overcome interference.
Through the technology, many redundant bits will be inserted in original
information.
When error code is caused by interference, the redundant bits can be
used to recover the original information.

3 types of Channel Coding are possible [per code block of N bits]


1/2 rate convolutional channel coding [2N + 16 bits], coded information
1/3 rate convolutional channel coding [3N + 24 bits]
turbo coding [3N + 12 bits]

Convolution code applies to voice service while Turbo code applies


to high rate data service.
Channel Coding Increases the delay
CONFIDENTIAL

Interleaving
Interleaving ‘spreads out’ consecutive bits in time
Reduces the probability of losing consecutive bits
Convolutional encoding is sensitive to consecutive bit loss
Trades delay time for data protection
Longer interleaving periods have better data protection with more
delay
Interleaving periods:10, 20, 40, or 80 ms
Most coding schemes perform better on random data errors than
on blocks of errors.
By interleaving the data, no two adjacent bits are transmitted
near to each other, and the data errors are randomized.
CONFIDENTIAL

Spreading Codes in WCDMA


In WCDMA, two types of codes are used in tandem for spreading
the channel bits into a wideband CDMA chip sequence:
channelization codes, and
scrambling codes.
after spreading the
the channelization code scrambling code only
performs the actual signal modifies the chip values in
spreading to the final chip
the transmitted chip sequence
rate (3.84 Mchips/s) in such a way that the cross-
correlation interference in the
system is minimised.
CONFIDENTIAL

DL & UL Channelization Codes


Channelization codes, or Walsh Codes, are often referred to as Orthogonal
Variable Spreading Factor (OSVF)
SF for the DL transmission in FDD mode = {4, 8, 16, 32, 64, 128, 256, 512}
SF for the UL transmission in FDD mode = {4, 8, 16, 32, 64, 128, 256}
- A lower SF means a higher data rate, because this means less chips per symbol
- PS384 kbps (DL) SF=8 => 8 chips per symbol
- AMR12.2 kbps (DL) SF=128 => 128 chips per symbol

The codes have orthogonal properties to minimize the interference between


different users.
Two vectors that are orthogonal give the resulting vector 0, when they are
multiplied with each other.
This means that the coded information is only affected by the “right” orthogonal code when it is
dispread.
In this way the interference can be minimized.
The channelization codes preserve the orthogonality between the different physical channels of users
even if they operate at different bit rates

Orthogonal codes are suited for channel separation, where synchronisation


between different channels can be guaranteed, e.g.
downlink channels under one cell,
uplink channels from a single user;
- uplink signals from different users are not time synchronised.
CONFIDENTIAL

Channelization codes
Channelization codes are very The required bit rate - and thus
important in downlink, since they the spreading factor - of some
are used for multiplexing (at the services may change over time.
transmitter) and separating (at the The transmitter takes care of
receiver) the signals intended for changes in the spreading factor
different terminals. among others by changing the
In uplink, channelization codes are channelization code.
used for multiplexing the data and The channelization codes are
control channel (DPDCH and based on the Orthogonal
DPCCH) signals transmitted from a Variable Spreading Factor
single terminal. (OVSF) technique, which allows
In both directions, the the spreading factor to be
channelization codes are employed changed without disrupting the
for spreading the channel bits to the orthogonality between different
final chip rate of 3.84 Mchips/s. codes of different lengths
simultaneously in use.
CONFIDENTIAL

Channelization Code Tree

SF=1 SF=2 SF=4 SF=8 SF=16 ... SF=256


C16(0)=[.........
C8(0)=[11111111]
...]
C16(1)=[.........
C4(0)=[1111] ...]
C16(2)=[.........
C8(1)=[1111-1-1-1-1] ...]
C2(0)=[11] C16(3)=[.........
...]
C16(4)=[.........
C8(2)=[11-1-111-1-1] ...]
C16(5)=[.........
C4(1)=[11-1-1] ...]
C16(6)=[.........
C8(3)=[11-1-1-1-111] ...]
C16(7)=[.........
C0(0)=[1
...]
] C16(8)=[.........
C8(0)=[1-11-11-11-1] ...]
C16(9)=[.........
C4(2)=[1-11-1] ...]
C16(10)=[.........
C8(5)=[1-11-1-11-11] ..]
C2(1)=[1-1] C16(11)=[...........
]
C16(12)=[.......
C8(6)=[1-1-111-1-11] ....]
C16(13=[........
C4(3)=[1-1-11] ...]
C16(14)=[.......
C8(7)=[1-1-11-111-1] ....]
C16(15)=[.......
....]
CONFIDENTIAL

Tree of Orthogonal Channelization Codes in Downlink


The codes have C8(0) = [ 1 1 1 1 1 1 1 1 ] ...
orthogonal C4(0) = [ 1 1 1 1 ]
properties to C8(1) = [ 1 1 1 1 0 0 0 0 ]
...
minimize the
interference C2(0) = [ 1 1 ]
C4(1) = [ 1 1 0 0 ]
C8(2) = [ 1 1 0 0 1 1 0 0 ] ...
between different
users. C1(0) = [ 1 ]
C8(3) = [ 1 1 0 0 0 0 1 1]
...

Channelization Channelization Code Tree C8(4) = [ 1 0 1 0 1 0 1 0 ] ...


codes of different C4(2) = [ 1 0 1 0 ]
length, C2(1) = [ 1 0 ] C8(5) = [ 1 0 1 0 0 1 0 1 ]
...
depending of the
bit rate C8(6) = [ 1 0 0 1 1 0 0 1 ]
...
C4(3) = [ 1 0 0 1 ]
Ensures C8(7) = [ 1 0 0 1 0 1 1 0 ]
orthogonality Spreading factor: ...
even with SF = 1 SF = 2 SF = 4 SF = 8
different rates
and spreading
factors
384 user #2
128 user #1
384 user #1

SF
Signaling 4
SF
8
SF
16
CONFIDENTIAL

DL Primary Scrambling Code


The data stream after the channelization
codes, multiplied by a code from a group of
special binary codes, to distinguish
between different transmitters.
UMTS uses 512 primary scrambling codes,
divided into 64 groups of 8
The Common Pilot Channel (CPICH) is an
unmodulated code channel, which is
scrambled with the cell-specific primary
scrambling code.
One DL scrambling code is used per sector
in the base station, and it makes the signals
from different sources separable from each
other.
The DL Scrambling code is used in the cell
selection, reselection, and handover
process by the UE to distinguish the
desired cell.
CONFIDENTIAL

KV Scrambling Code Group Plan

15 Sites per Group


CONFIDENTIAL

Where are codes used?

Dedicated User
Channel

In the Uplink
In the Uplink
(UE  Node B),
(UE  Node B),
the user's data and signaling
information is separated by terminals are separated by
Channelization Codes Scrambling Codes

signaling
data
In the Downlink In the Downlink

(Node B  UE), (Node BUE),


cells are separated by
user connections are separated by
Channelization Codes Scrambling Codes
CONFIDENTIAL

Channelization and Scrambling Code Summary

Channelization code Scrambling code

Usage Uplink: Separation of Uplink: Separation of


physical data and control terminals
channels from the same
terminal
Downlink: Separation
Downlink: Separation of of sectors (cell)
downlink dedicated user
channels
Length Variable (depends on the Fixed
user allocation)

Number of Depends on the spreading Uplink: Several


codes factor (SF) million
Downlink: 512
CONFIDENTIAL

Air interface - Modulation


• RF communication systems use advanced forms of modulation to increase the
amount of data that can be transmitted in a given amount of frequency spectrum
Q Q

QPSK uses four phases 1011 1001 0001 0011


10 00
They are positioned on 1010 1000 0000 0010
a circle so that they can
I I
all be transmitted with
1110 1100 0100 0110
the same energy
11 01
This gives maximum
phase-separation 1111 1101 0101 0111
between adjacent points
and thus the best
immunity to corruption QPSK 16QAM
Can encode two bits per
symbol to minimize the 2 bits / symbol = 4 bits / symbol =
BER 480 kbit/s/HS-PDSCH = 960 kbit/s/HS-PDSCH =
max. 7.2 Mbit/s max. 14.4 Mbit/s

The higher order modulations need a much better SNR because when an error occurs on
one symbol, more bits are lost.
Example: EDGE (Enhanced Data rates for GSM Evolution) uses an 8-PSK modulation scheme. It can provide data
rates up to 380 kbps, but only for users close to the base station (in a 100 m radius approximately),

In UMTS, a spread spectrum modulation is used. It is made of two stages:


Symbol modulation based on spread spectrum symbols. Each symbol is modulated by several chips,
Chip modulation based on a simple narrow band modulation. This is a classical PSK modulation.
CONFIDENTIAL

Rake Receiver

CDMA uses the multipath signals and combines them to make an even stronger
signal at the receivers due to its wide bandwidth and Rake receivers
It is essentially a set of four or more receivers
One of the receivers (fingers) constantly searches for different multipath and
helps the other 3 fingers to lock into strong multipath signals which have more
than one chip delay
Each finger then demodulates the signal corresponding to a strong multipath
and then the results are combined together to make a stronger signal
Micro/Macro Diversity Combining CONFIDENTIAL

Node B
MS RAKE Summed signal
RAKE Receiver
Receiver

Micro Diversity Points


max ratio combining is used

Node B
Active cell set
Macro Diversity Point
selection combining is used

Node B
S-RNC Core Network

Node B D-RNC
CONFIDENTIAL

UMTS Channel Mapping


CONFIDENTIAL

UMTS Channel Terminology

Downlink – Transmitted by UTRAN, received by UE.


Uplink – Transmitted by UE, received by UTRAN.
Common – Carries information to/from multiple UEs.
Dedicated – Carries information to/from a single UE.
Logical – Defined by what type of information is transferred, e.g.,
signaling or user data.
Transport – Defined by how data is transferred over the air
interface, e.g., multiplexing of Logical Channels.
Physical – Defined by physical mappings and attributes used to
transfer data over the air interface, e.g., spreading rate.
CONFIDENTIAL

Radio Interface Protocol Architecture (in UE)

Radio Bearers – Carry signaling between


RRC and RLC or carry user data from
Radio Resource Control (RRC)
application layers to Layer 2.
Packet Data Convergence Protocol (PDCP)
Logical Channels – Carry signaling and user
Broadcast/Multicast Control (BMC)
data between RLC and MAC.
Radio Link Control (RLC)
Transport Channels – Carry signaling and
Medium Access Control (MAC)
user data between MAC and PHY.
Layer 1 or Physical Layer (PHY or L1)
Physical Channels – Carry signaling and
user data over the radio link.
CONFIDENTIAL

UMTS Channel Organization


In UMTS there are three different types of channels
UE
Node B
RNC

Logical channels

Transport channels

Physical Frames
channels
CONFIDENTIAL

Radio Interface Channel Description

: Logical Channels
Logical Channels were created to transmit a specific content.
There are for instance logical channel to transmit the cell system information, paging
information, or user data.
Logical channels are offered as data transfer service by the Medium Access Control (MAC)
layer to the next higher layer.
Consequently, logical channels are in use between the mobile phone and the RNC.
Transport Channels (TrCH)
The MAC layer is using the transport service of the lower, Physical layer.
The MAC layer is responsible to organise the logical channel data on transport channels.
This process is called mapping. In this context, the MAC layer is also responsible to
determine the used transport format.
The transport of logical channel data takes place between the UE and the RNC.
Physical Channels (PhyCH)
The physical layer offers the transport of data to the higher layer.
The characteristics of the physical transport have to be described.
When we transmit information between the RNC and the UE, the physical medium is
changing.
Between the RNC and the Node B, where we talk about the interface Iub, the transport of
information is physically organised in so-called Frames.
Between the Node B and the UE, where we find the WCDMA radio interface Uu, the physical
transmission is described by physical channels.
A physical channel is defined by the UARFCN and the a spreading code in the FDD mode.
CONFIDENTIAL

Downlink channel mapping


BCCH PCCH CCCH CTCH DCCH DTCH Logical Channels

BCH PCH FACH DCH DSCH Transport Channels

SCH-1/SCH-2 DPCH PDSCH Physical Channels


CCPCH-1 CCPCH-2
(created in (DPDCH+DPCCH)
NodeB)

Logical Channels: Transport Channels: Physical Chs:


Control Channels (CCH): Common Transport Channels: characterised by
Broadcast Control Channel (BCCH) Broadcast Channel (BCH) UARFCN,
Paging Control Channel (PCCH) Paging Channel (PCH)
scrambling code,
Common Control Channel (CCCH) Forward Access Channel (FACH)
Dedicated Control Channel (DCCH) Downlink Shared Channel (DSCH) channelization
Traffic Channels (TCH): Random Access Channel (RACH) code (optional),
Dedicated Traffic Channel (DTCH) Common Packet Channel (CPCH) start and stop
Common Traffic Channel (CTCH) Dedicated Transport Channels: time, and
Dedicated Channel (DCH) relative phase
CONFIDENTIAL

Uplink channel mapping


CCCH DTCH DCCH Logical Channels

RACH DCH CPCH Transport Channels

PRACH DPDCH DPCCH PCPCH Physical Channels

Logical Channels: Transport Channels: Physical Chs:


Control Channels (CCH): Common Transport Channels: characterised by
Common Control Channel (CCCH) Random Access Channel (RACH) UARFCN,
Dedicated Control Channel (DCCH) Common Packet Channel (CPCH)
scrambling code,
Traffic Channels (TCH): Dedicated Transport Channels:
channelization
Dedicated Traffic Channel (DTCH) Dedicated Channel (DCH)
code (optional),
start and stop
time, and
relative phase
CONFIDENTIAL

Broadcast Channel

Broadcast Channel (Downlink)


Broadcast Control Channel (BCCH) [Logical/L3]
Broadcast Channel (BCH) [Transport/L2]
Primary Common Control Physical Channel (PCCPCH) [L1]

First channel to be decoded by UE after acquisition


Carries system information such as system ID, cell ID,
neighbor cell information, system frame number, etc.

The BCCH Logical Channel carries system information


messages necessary for the UE to camp on a WCDMA cell
and to access the system.
UTRAN broadcasts this channel continuously, repeating the
system information messages at a system configurable
repetition rate.
The UE typically reads this channel after power-up or when
camping on a new cell and periodically thereafter to ensure that
the UE has current system information.
CONFIDENTIAL

Paging Channel

Paging Channel (Downlink)


Paging Control Channel (PCCH)
Paging Channel (PCH)
Secondary Common Control Physical Channel (SCCPCH)

Page Indicator Channel (PICH)


Monitored by UE in Idle Mode, CELL_PCH, and
URA_PCH
Carries Paging messages

The PCCH Logical Channel carries paging messages to


notify the UE of incoming calls. It is used in conjunction
with the physical Page Indicator Channel (PICH).
UTRAN broadcasts the PCH continuously, but the UE
typically only monitors the PICH during assigned slots
CONFIDENTIAL

Random and Forward Access Channels


Random Access Channel (Uplink)
Common Control Channel (CCCH) [Logical/L3]
Random Access Channel (RACH) [Transport/L2]
Physical Random Access Channel (PRACH)
Transmitted by UE to access the system
Forward Access Channel (Downlink)
Common Control Channel (CCCH)
Forward Access Channel (FACH)
Secondary Common Control Physical Channel (SCCPCH)
Acquisition Indication Channel (AICH)
Carries UTRAN messages to UE in Idle mode

These Uplink and Downlink Channels are used by the UE and


UTRAN to communicate when the UE does not have a Dedicated
Channel allocated to it.
The RACH has an access protocol associated with it, in which the UE
transmits a preamble at increasing power levels until the UTRAN responds
on the AICH.
When UTRAN receives a message from the UE on RACH, it responds on
FACH. The FACH Transport Channel is mapped to an SCCPCH.
CONFIDENTIAL

Dedicated Channels
Dedicated Channels (Uplink/Downlink)
Dedicated Control Channel (DCCH) [Logical/L3]
Dedicated Traffic Channel (DTCH) [Logical/L3]
Dedicated Channel (DCH) [Transport/L2]
Dedicated Physical Data Channel (DPDCH)
Dedicated Physical Control Channel
(DPCCH)

Carries signaling and user data

These Uplink and Downlink Channels are


used to carry signaling and user data
between the UTRAN and an individual UE.
These channels are assigned when a voice
call is active or when a packet data call is
transferring data.
CONFIDENTIAL

Frame Structure and Timing


Frame Timing
Transmission Time Interval (TTI)
- TTI: 10, 20, 40, 80 ms boundaries
10 ms radio frames, 15 slots per frame
38400 chips per frame
Super Frame = 72 Frames = 720ms
At the 3.84 x 10^6 chipping rate =>
Slot Timing 38,400 chips per 10 ms Frame =>
2560 chips per slot, 0.67 ms 2560 chips per slot.

Symbol Timing
Symbol consists of a number of chips
OVSF determines chips/symbol
OVSF ranges from 4 to 512 chips/symbol
(640 to 5 symbols per slot)
- AMR12.2kbps: SF=128 => 128 chips/symbol => 640/128=5 symbols/slot
- PS384kbps: SF=8 => 8 chips/symbol => 640/8=5=80 symbols/slot
CONFIDENTIAL

Uplink Frame Structure for DPDCH and DPCCH


The control information
Each frame of length 10 ms is split into 15 slots,
consists of:
Each of length Tslot = 0.667 ms, corresponding to pilot bits to support
one power-control period. channel estimation for
A super frame corresponds to 72 consecutive frames, coherent detection
i.e. the super-frame length is 720 ms. transmit power-control
(TPC) commands,
feedback information
(FBI)
optional transport format
combination indicator
(TFCI)

UL DPCH is two Physical Channels: the DPDCH and the


DPCCH.
UL Dedicated Physical Data Channel (DPDCH) sent on I
branch.
UL Dedicated Physical Control Channel (DPCCH) sent on
Q branch.
CONFIDENTIAL

Downlink Frame Structure for DPDCH and DPCCH


The control information
consists of:
pilot bits to support
channel estimation for
coherent detection
transmit power-control
(TPC) commands,
feedback information
(FBI)
optional transport format
combination indicator
(TFCI)

There is only one type of downlink dedicated physical channel, the Downlink
Dedicated Physical Channel (downlink DPCH).
Within one downlink DPCH, i.e. the dedicated transport channel (DCH), is
transmitted in time-multiplex with control information (known pilot bits, TPC
commands, and an optional TFCI).
The downlink DPCH can thus be seen as a time multiplex of a downlink DPDCH
and a downlink DPCCH.
CONFIDENTIAL

System Information Messages


CONFIDENTIAL

System Information Messages


The BCCH (Logical Ch) is mapped to the BCH (TrCh).
The Node-B continuously transmits the SIBs in system information messages
on the BCH

A UE is always able to find the MIB on the BCCH and to get the
scheduling information for the other SIBs
The SIBs contain all information necessary for UEs to work
properly in both Idle and Connected mode
UE timers and counters, Cell selection and reselection parameters, Common
Physical Channel parameters, Measurement parameters, Neighbor list
parameters
Contents MIB SIB1 SIB3 SIB5 SIB7 SIB11 SIB 12
PLMN identity X
Cell selection and reselection parameters X X
Paging parameters X X
Measurement management X X
Cell and common channel configuration X
Timers and counters in Idle and Connected X
mode
Power control on common channel X
LA and RA updating X
SIB Scheduling Information X
CONFIDENTIAL

System Information Structure


The System Information elements are broadcast in System Information
Blocks (SIBs).
SIB groups together System Information elements related to the same
kind of activity controls.
Different types of SIB exist, and each type contains a specific collection
of information.
The SIBs are organized as a tree, as shown below.
A MIB gives reference to a number of SIBs, and its functions include
scheduling information for those SIBs.
CONFIDENTIAL
NEMO
BCH, MIB, SIB (1)
NEMO CONFIDENTIAL

BCH, MIB, SIB (2) Cell Selection and Reselection


Parameters

{[-173 (thermal noise density)] – (-58)}


= -115 (qRxLevMin)
CONFIDENTIAL
NEMO
BCH, MIB, SIB (3)
CONFIDENTIAL
NEMO
BCH, MIB, SIB (4)
Cell & Common Channel Configuration
CONFIDENTIAL

DL Common Control Channel Power Settings


CONFIDENTIAL

DL Common Control Channel Power Settings


Power Settings for the different downlink common channels that are
controlled through cell setup and cell reconfiguration.
These include Primary Common Pilot Channel (PCPICH),
Synchronization Channel (SCH)
Primary Common Control Physical Channel (PCCPCH),

DL Common control channels must be heard over the whole cell, thus
their power setting is designed for “cell edge”.
DL Common Channels does not have a power control
The power of the common physical channels are set relative to the
CPICH:
Channel Type Power Settings Activity Factor Max. Pwr(dBm) Avr. Pwr(dBm) Avr. Pwr (W) % of Tot.
P-CPICH 0 100% 33.0 33.0 2.0 10.0%
P-SCH -5 10% 31.2 21.2 0.1 0.7%
S-SCH -5 10% 29.5 19.5 0.1 0.4%
BCH -2 90% 29.9 29.4 0.9 4.4%
PICH -7 96% 26.0 25.8 0.4 1.9%
PCH -2 20% 32.6 25.6 0.4 1.8%
AICH -6 7% 27.0 15.3 0.0 0.2%
FACH-1 1 10% 34.8 24.8 0.3 1.5%
FACH-2 1 30% 34.5 29.3 0.8 4.2%
Total Power used for Control Channels from a 20W Carrier 4.2 20.9%

Power Settings: Actual settings in OSS (Huawei Recommended)


Avr.Pwr (dBm/W): Takes into account the Activity factor
CONFIDENTIAL
DL Common Control Channel:
Power Calculations example Node-B with RRU
Huawei
Top of Ref Point Huawei Top of Node-B
Node-B Feeder at Antenna Max. Pwr(dBm) Avr. Pwr(dBm) Avr. Pwr (W) % of Tot.
Total Available Power Per Sector 20 W Loss 17.8 33.0 33.0 2.0 10.0% P-CPICH
43.0 dBm 0.5 42.5 28.0 18.0 0.1 0.3% P-SCH
28.0 18.0 0.1 0.3% S-SCH
CPICH Power 33.0 dBm 32.5 31.0 30.5 1.1 5.7% BCH
2.0 W 1.8 26.0 25.8 0.4 1.9% PICH
31.0 24.0 0.3 1.3% PCH
27.0 15.3 0.0 0.2% AICH
Common Channel Allocation Relative to CPICH Power 34.0 24.0 0.3 1.3% FACH-1
rel dB Activity Factor 34.0 28.8 0.8 3.8% FACH-2 Not Used
P-CPICH 0 100%
P-SCH -5 10% Huawei at Antenna Input
S-SCH -5 10% Max. Pwr(dBm) Avr. Pwr(dBm) Avr. Pwr (W) % of Tot.
BCH -2 90% 32.5 32.5 1.8 10.0% P-CPICH
PICH -7 96% 27.5 17.5 0.1 0.3% P-SCH
PCH -2 20% 27.5 17.5 0.1 0.3% S-SCH
AICH -6 7% 30.5 30.0 1.0 5.7% BCH
FACH-1 1 10% 25.5 25.3 0.3 1.9% PICH
FACH-2 1 30% 30.5 23.5 0.2 1.3% PCH
26.5 14.8 0.0 0.2% AICH
33.5 23.5 0.2 1.3% FACH-1
Total Power Used For Common Channels 4.2 W 3.7 33.5 28.3 0.7 3.8% FACH-2 Not Used
36.2 dBm 35.7
20.9% 20.9%

Power Available For Dedicated Channels 15.8 W 14.1


42.0 dBm 41.5
79.1% 79.1%

Description of Common Channel Name Description

P-CPICH Primary Common Pilot Channel Predefined pilot sequence (15kbps, SF = 256), used for UE measurements on DL
P-SCH Primary Synch Channel 256 Chip code used for initial slot syncronisation, (256 chips out of every 2560 chip slot).
S-SCH Secondary Synch Channel Sequence of 256 chip code words, used for frame sync and SC Group ID (256 chips out of every 2560 chip slot).
P-CCPCH Primary Common Control PhysicalCarries
Channelthe BCH information (system & cell specific using MIBs & SIBs) 15ksps, SF=256. Not transmitted during first 256chips of slot.
S-CCPCH Secondary Common Control Physical
UsedChannel
to carry FACH and PCH (Only on air when information to carry)
PICH Paging Indicator Channel Carries paging indicators. (SF=256).
AICH Acquisition Indicator Channel Carries acquisition indicators to respond to RACH pre-ambles. (SF=256). (4096 chips out of 5120 chips)
CONFIDENTIAL
DL Common Control Channel:
Power Calculations example Node-B with Feeder

Huawei
Top of Ref Point Huawei Top of Node-B
Node-B Feeder at Antenna Max. Pwr(dBm) Avr. Pwr(dBm) Avr. Pwr (W) % of Tot.
Total Available Power Per Sector 20 W Loss 10.0 33.0 33.0 2.0 10.0% P-CPICH
43.0 dBm 3.0 40.0 28.0 18.0 0.1 0.3% P-SCH
28.0 18.0 0.1 0.3% S-SCH
CPICH Power 33.0 dBm 30.0 31.0 30.5 1.1 5.7% BCH
2.0 W 1.0 26.0 25.8 0.4 1.9% PICH
31.0 24.0 0.3 1.3% PCH
27.0 15.3 0.0 0.2% AICH
Common Channel Allocation Relative to CPICH Power 34.0 24.0 0.3 1.3% FACH-1
rel dB Activity Factor 34.0 28.8 0.8 3.8% FACH-2 Not Used
P-CPICH 0 100%
P-SCH -5 10% Huawei at Antenna Input
S-SCH -5 10% Max. Pwr(dBm) Avr. Pwr(dBm) Avr. Pwr (W) % of Tot.
BCH -2 90% 30.0 30.0 1.0 10.0% P-CPICH
PICH -7 96% 25.0 15.0 0.0 0.3% P-SCH
PCH -2 20% 25.0 15.0 0.0 0.3% S-SCH
AICH -6 7% 28.0 27.5 0.6 5.7% BCH
FACH-1 1 10% 23.0 22.8 0.2 1.9% PICH
FACH-2 1 30% 28.0 21.0 0.1 1.3% PCH
24.0 12.3 0.0 0.2% AICH
31.0 21.0 0.1 1.3% FACH-1
Total Power Used For Common Channels 4.2 W 2.1 31.0 25.8 0.4 3.8% FACH-2 Not Used
36.2 dBm 33.2
20.9% 20.9%

Power Available For Dedicated Channels 15.8 W 7.9


42.0 dBm 39.0
79.1% 79.1%
CONFIDENTIAL

DL Common Control Channel

• Different quality requirement for the common


channels make power planning an important
task

Example values in dBm


P-CCPCH CPICH = 33dBm
coverage Pilot P-CCPCH = 28 dBm (-5)
SCH1= SCH2 = P-CCPCH = 28dBm (-5)
coverage

In this example the mobile "sees"


the cell but cannot access it as it
cannot decode the BCH
CONFIDENTIAL

UMTS Protocol Overview


CONFIDENTIAL

UMTS Signaling Protocol Stack


The UMTS signaling protocol stack is divided into Access Stratum (AS) and Non-
Access Stratum (NAS).

The Non-Access Stratum architecture evolved from the GSM upper


layers and includes:
Connection Management – Handles circuit-switched calls and includes sublayers responsible for
call control (e.g., establish, release), supplementary services (e.g., call forwarding, 3-way calling),
and short message service (SMS).
Session Management – Handles packet-switched calls (e.g., establish, release).
Mobility Management – Handles location updating and authentication for CS calls.
GPRS Mobility Management – Handles location updating and authentication for PS calls.

The Access Stratum architecture is new for WCDMA, and will see in a
bit more detail in the next slides
CONFIDENTIAL

Control Plane Protocol Stack


The control plane protocol stack illustrates how signaling protocols are
terminated. This example shows a circuit-switched call operating on
dedicated Physical Channels.

Access Stratum (AS)


• Radio Resource Control (RRC) protocols are defined between UE and RNC to
handle establishment, release, and configuration of radio resources.
• Radio Link Control (RLC) protocols are defined between UE and RNC to provide
segmentation, re-assembly, duplicate detection, and other traditional Layer 2 functions.
• Medium Access Control (MAC) protocols are defined between UE and RNC to
multiplex user plane and control plane data.
• Physical Layer protocols are defined between UE and Node B to transfer data over
the radio link. The interface between UE and RNC at the Physical Layer handles
macrodiversity combining and splitting functions.
CONFIDENTIAL

User Plane Protocol Stack


The user plane protocol stack illustrates how user protocols are
terminated. This example shows a circuit-switched voice call operating
on dedicated Physical Channels.

Non-Access Stratum (NAS)


• Application can consist of several layers. For example, in the case of voice, the
topmost layer corresponds to the actual acoustic signals heard by users on both ends,
whereas a lower layer carries the vocoded bits. In this protocol architecture, vocoders
reside at the UE and at the MSC to translate digitized voice between the format
transmitted over the air and that sent over digital wirelines (e.g., E1).
Access Stratum (AS)
• The RLC, MAC, and Physical Layer protocols for user plane are the same as for
the control plane.
• RRC does not participate in user plane protocols. It is responsible for setting up the
radio bearers and channels, but does not touch the data.
CONFIDENTIAL

Radio Interface Protocol Architecture (in UE)

Radio Bearers – Carry signaling between


RRC and RLC or carry user data from
Radio Resource Control (RRC)
application layers to Layer 2.
Packet Data Convergence Protocol (PDCP)
Logical Channels – Carry signaling and user
Broadcast/Multicast Control (BMC)
data between RLC and MAC.
Radio Link Control (RLC)
Transport Channels – Carry signaling and
Medium Access Control (MAC)
user data between MAC and PHY.
Layer 1 or Physical Layer (PHY or L1)
Physical Channels – Carry signaling and
user data over the radio link.
CONFIDENTIAL

Access Stratum Layer 3:


Radio Resource Control (RRC)
RRC Functions of Access Stratum Layer 3
RRC is the overall controller of the Access Stratum, responsible for
configuring all other layers in the Access Stratum and providing the control
and signaling interface to the NAS layer.
Radio Resource Control (RRC) Include:
• Broadcast of System Information
• RRC Connection Management
• Radio Bearer Management
• RRC Mobility Functions
• Paging and Notification Functions
• Routing of Higher Layer Messages
• Control of Ciphering and Integrity Protection
• Measurement Control and Reporting
• Power Control Functions
CONFIDENTIAL

Access Stratum Layer 2


Layer 2 consists of four sublayers: BMC, PDCP, RLC and MAC.
Broadcast/Multicast Control (BMC)
- Involved in the Cell Broadcast Messages
- Storage, scheduling, transmission, delivery
- Request for radio resources
Packet Data Convergence Protocol (PDCP)
- Packet data header compression/decompression
Radio Link Control (RLC)
- Typical Layer 2 functions
- Segmentation, reassembly, concatenation, padding
- Retransmission control, flow control
- Duplicate detection, in-sequence delivery
- Error correction
- Ciphering
Medium Access Control (MAC)
- Mapping and multiplexing Logical Channels to Transport Channels
- Priority handling of data flows
- UE identification on common channels
- Traffic volume measurements
- Random Access Channel procedures
- Ciphering
CONFIDENTIAL

Access Stratum Layer 1: Physical Layer

Physical Layer functions are:


Macro-diversity distribution/combining and soft handover
Error detection on Transport Channels
Forward Error Correction (FEC) encoding/decoding
Interleaving/deinterleaving of Transport Channels
Multiplexing/demultiplexing of Transport Channels
Rate matching
Power weighting and combining of Physical Channels
Modulation/demodulation
Spreading/despreading
Frequency and time (chip, bit, slot, frame) synchronization
Measurements (e.g., FER, SIR, interference power, transmit power, etc.)
Closed loop power control
RF processing
CONFIDENTIAL

UE Call States
CONFIDENTIAL
UE Call States

Idle Mode
The UE operates in Idle mode whenever it has no active CS or PS call.
UE monitors the PCH and the associated PICH. It may “sleep” between paging cycles, by disabling some of its circuitry to
improve standby time.
CELL_DCH State
The CELL_DCH state may be entered from the Idle Mode when an RRC connection is established, or when a Dedicated
Physical Channel is established from the CELL_FACH state.
PS call may operate in CELL_DCH state, especially if it is a high data transfer
CELL_FACH State
The CELL_FACH state may be entered from the Idle Mode when an RRC connection is established or from the
CELL_DCH state when directed by UTRAN to release dedicated channels
UE continuously monitors the FACH, because UTRAN can send it data or signaling at any time (no sleeping!).
CELL_PCH State
The CELL_PCH state may be entered from the CELL_FACH state, when UTRAN detects a lack of activity from the UE
during a PS call.
Similar to Idle Mode, the UE monitors the PCH and the associated PICH. It may sleep between paging cycles. If the UE
has data or signaling to send, it autonomously transitions to CELL_FACH and transmits on the RACH. The network
knows which cell is camped under and pages that cell only. UE is required to perform a cell update procedure (from
CELL_FACH) whenever its location changes to a new cell.
URA_PCH State
The URA_PCH state is similar to the CELL_PCH state, except that it is used when UTRAN detects very low activity from
the UE during a PS call and wants to limit the number of cell update procedures performed by the UE.
The UE is required to perform a URA update procedure (from CELL_FACH) whenever its location changes to a new
routing area. Because a routing area may encompass many cells, the frequency of updates is much lower than for the
CELL_PCH state. The tradeoff is that UTRAN must page the UE in all cells of the routing area, rather than in just a single
cell. [URA: UTRAN Registration Area}
Thank You

Confidential
CONFIDENTIAL

Support Slides
CONFIDENTIAL

Downlink channel mapping (Ericsson FDD)


Logical Channels Transport Channels Physical Channels
(Layers 3+) (Layer 2) (Layer 1)
CPICH
Null Data S/P
Common Pilot Channel
Cch 256,0 Gain
Sync Codes(*)
BCCH BCH Data P-CCPCH(*) PSC
S/P
Broadcast Control Ch. Broadcast Ch. Encoding Primary Common Control Physical Ch.
Cch 256,1 Gain

PCCH PCH Data GP 


Paging Control Ch. Paging Ch. Encoding
SSCi
S-CCPCH
S/P
CCCH Secondary Common Control Physical Ch. SCH (Sync Channel)
GS
Common Control Ch. Cch Gain
FACH Data
CTCH Forward Access Ch. Encoding
Common Traffic Ch. DPCH (Dedicated Physical Channel)
CCTrCH One per UE
DCCH DCH Data
Dedicated Control Ch. Dedicated Ch. Encoding Cell-specific
Scrambling Downlink
DTCH DCH Data Code RF Out
Dedicated Traffic Ch. 1 Dedicated Ch. Encoding M
DPDCH (one or more per UE)
U M
Dedicated Physical Data Ch.
X U
X
S/P
 I+jQ
I
Filter I/Q
DTCH DCH Data
Cch Gain
 Filter
Modulator
Dedicated Traffic Ch. N Dedicated Ch. Encoding Q
DPCCH (one per UE)
Pilot, TPC, TFCI bits
Dedicated Physical Control Ch.

SHCCH DSCH Data PDSCH


S/P * Note regarding P-CCPCH and SCH
DSCH Control Ch. Downlink Shared Ch.Encoding Physical Downlink Shared Channel
Cch Gain
Sync Codes are transmitted only in bits 0-255 of each timeslot;
AICH P-CCPCH transmits only during the remaining bits of each timeslo
Access Indication data S/P
(Acquisition Indication Channel)
PICH Cch Gain
Paging Indication bits S/P
(Paging Indication Channel )
AP-AICH Cch Gain
Access Preamble Indication bits S/P
(Access Preamble Indication Channel )
CSICH Cch Gain
CPCH Status Indication bits S/P
(CPCH Status Indication Channel )
Cch Gain
CD/CA-ICH
CPCH Status Indication bits S/P
(Collision Detection/Channel Assignment )
Cch Gain
CONFIDENTIAL

Uplink channel mapping (Ericsson FDD)

Logical Channels Transport Channels Physical Channels


(Layers 3+) (Layer 2) (Layer 1)
Chd Gd

CCCH RACH Data PRACH


Common Control Ch. Random Access Ch. Coding Physical Random Access Ch.

RACH Control Part

Chc Gc j
Chd Gd
DTCH (packet mode) CPCH Data PCPCH UE
Dedicated Traffic Ch. Common Packet Ch. Coding Physical Common Packet Ch. Scrambling Uplink
 Code
RF Out
PCPCH Control Part

I
Chc Gc j I+jQ Filter I/Q
 Filter
Mod.

Chd,1 Gd
Q
CCTrCH DPDCH #1
Dedicated Physical Data Ch.
Chd,3 Gd
DCCH DCH Data
DPDCH #3 (optional)
Dedicated Control Ch. Dedicated Ch. Encoding
Dedicated Physical Data Ch. I
Chd,5 Gd
DTCH DCH Data
DPDCH #5 (optional)
Dedicated Traffic Ch. 1 Dedicated Ch. Encoding M Dedicated Physical Data Ch.
U Chd,2 Gd
X DPDCH #2 (optional) 
Dedicated Physical Data Ch.
Chd,4 Gd
DTCH DCH Data DPDCH #4 (optional)
Dedicated Traffic Ch. N Dedicated Ch. Encoding Dedicated Physical Data Ch.
Chd,6 Gd
DPDCH #6 (optional) Q
Dedicated Physical Data Ch.

Chc Gd j
DPCCH
Pilot, TPC, TFCI bits
Dedicated Physical Control Ch.
CONFIDENTIAL

Signaling Diagrams
CONFIDENTIAL

Mobile Originating
Call Setup
[CS Services]

Figure shows
the procedure
for the Mobile
Originating Call
Setup.
The Procedure
starts with
RRC
Connection
Request and
ends with
Connect Ack.
CONFIDENTIAL

Mobile Terminating
Call Setup
[CS Services]

Figure shows
the procedure
for the Mobile
Terminating
Call Setup.
CONFIDENTIAL

Terminating SMS

The procedure
for mobile
terminated
SMS is shown
CONFIDENTIAL

RAB Establishment
(MS initiated) [PS
Services]

The UE is in PMM-
IDLE mode and
sends the Service
Request message
including RAB
Assignment to the
SGSN.

Precondition for the


scenario is that a
Packet Service
Attach and a
PDP Context
Activation have
been done.
CONFIDENTIAL

Packet Service Attach


Including PDP Context
Activation

The UE shall
perform a GPRS
Attach to the SGSN
in order to obtain
access
to the GPRS
services. The
Packet Service
Attach including
PDP Context
Activation
procedure
CONFIDENTIAL

Contents
WCDMA/UMTS Network Architecture
Core Network Element Overview
UTRAN Network Element Overview
Radio Access Bearer
Introduction to Air-Interface
UMTS-FDD Carriers
Spreading & Processing Gain
DL & UL Channelization Codes
Channel Organization/Mapping in UMTS
DL Common Control Channel Power Settings
CONFIDENTIAL

Scrambling Code Planning Overview


CONFIDENTIAL

Basic Scrambling Code Theory

The Common Pilot Channel (CPICH) is an unmodulated code


channel, which is scrambled with the cell-specific primary
scrambling code.
One DL scrambling code is used per sector in the base station, and
it makes the signals from different sources separable from each
other.
The DL Scrambling code is used in the cell selection, reselection,
and handover process by the UE to distinguish the desired cell.
The P-SCH and S-SCH are decoded by the UE attempting to find
the P-CPICH.
Once connected into the network P-CCPCH broadcasts neighbour
lists, so helping the UE to find suitable handover partners.
UMTS uses 512 primary scrambling codes, divided into 64 groups
of 8
CONFIDENTIAL

Code Groups

Totally 512 (0…511) DL primary SC are subdivided into 64


(0…63) code
groups each of 8 codes.
Each cell has to be assigned by 1 particular scrambling code.
2 cells for a same sector but with different carriers can have
the same SC.

0 0 1 2 3 4 5 6 7
1 8 9 10 11 12 13 14 15
2 16 17 18 19 20 21 22 23
Code Group No. 3 24 25 26 27 28 29 30 31
(0,1,….,63) . . . . . . . . .
Total 64 code . . . . . . . . .
Groups . . . . . . . . .
. . . . . . . . .
. . . . . . . . .
63 504 505 506 507 508 509 510 511
CONFIDENTIAL

Cell Search Procedure


1. The UE acquires slot synchronization by
correlating the information on the P-SCH with
primary synchronization code, which is common
to all cells, and by detecting peak values at the
matched filter output.
2. The UE obtains frame synchronization and
determines the scrambling code group of the
cell (made up by eight primary scrambling
codes) by correlating the information on the S-
SCH with all secondary synchronization code
sequences and by detecting the peak value,
since the cyclic shifts of sequences are unique.
3. The UE determines the primaryScramblingCode
by correlating the CPICH with all codes within
the scrambling code group identified in Step2.
When the primary scrambling code has been
identified, the Primary Common Control Physical
Channel (P-CCPCH) will be detected and the
UE is able to read the information on the BCCH.
CONFIDENTIAL

Code Group Segregation


64 Code Groups are divided into 3 sets.
Code Group 0, CG-0, will not be used. Reserved since some vendors cannot use SC0

Set A: 45 groups reserved for Macro layer outdoor sites.


Set A will be further subdivided:
- Set A1 for current 2007 rollout , and will support
36 x 8codes = 288 codes = 288 cells = 96 sites (1-time reuse)
- Set A2 reserve for initial 2008 rollout of new sites
9 x 8codes = 72 codes = 72 cells = 24 sites
Set B: 9 groups for future expansions 2008/9, which can support
9 x 8codes = 72 codes = 72 cells = 24 sites (1-time reuse)
Set C: 9 groups for In-building, Micro and tested cells which can
support
9 x 8codes = 72 codes = 72 cells

Scrambling Code Groups


Set A1 Set A2 Set B Set C
1 … 36 37 … 45 46 … 54 55 … 63
36 9 9 9
CONFIDENTIAL

Code Group Assignments


S.C. Set S.C. Set
0 1 2 3 4 5 6 7 Cell 0 1 2 3 4 5 6 7 Cell
Rsv CG-0 0 0 1 2 3 4 5 6 7 CG-37 37 296 297 298 299 300 301 302 303 a
CG-1 1 8 9 10 11 12 13 14 15 a CG-38 38 304 305 306 307 308 309 310 311 b
CG-2 2 16 17 18 19 20 21 22 23 b CG-39 39 312 313 314 315 316 317 318 319 c

Macro Sites
CG-3 3 24 25 26 27 28 29 30 31 c CG-40 40 320 321 322 323 324 325 326 327 a
CG-4 4 32 33 34 35 36 37 38 39 a CG-41 41 328 329 330 331 332 333 334 335 b
CG-5 5 40 41 42 43 44 45 46 47 b CG-42 42 336 337 338 339 340 341 342 343 c
CG-6 6 48 49 50 51 52 53 54 55 c CG-43 43 344 345 346 347 348 349 350 351 a
CG-7 7 56 57 58 59 60 61 62 63 a CG-44 44 352 353 354 355 356 357 358 359 b
CG-8 8 64 65 66 67 68 69 70 71 b CG-45 45 360 361 362 363 364 365 366 367 c
CG-9 9 72 73 74 75 76 77 78 79 c CG-46 46 368 369 370 371 372 373 374 375 a
CG-10 10 80 81 82 83 84 85 86 87 a CG-47 47 376 377 378 379 380 381 382 383 b

Future Expansion
CG-11 11 88 89 90 91 92 93 94 95 b CG-48 48 384 385 386 387 388 389 390 391 c
CG-12 12 96 97 98 99 100 101 102 103 c CG-49 49 392 393 394 395 396 397 398 399 a
CG-13 13 104 105 106 107 108 109 110 111 a CG-50 50 400 401 402 403 404 405 406 407 b
CG-14 14 112 113 114 115 116 117 118 119 b CG-51 51 408 409 410 411 412 413 414 415 c
CG-15 15 120 121 122 123 124 125 126 127 c CG-52 52 416 417 418 419 420 421 422 423 a
CG-16 16 128 129 130 131 132 133 134 135 a CG-53 53 424 425 426 427 428 429 430 431 b
Macro Sites

CG-17 17 136 137 138 139 140 141 142 143 b CG-54 54 432 433 434 435 436 437 438 439 c
CG-18 18 144 145 146 147 148 149 150 151 c CG-55 55 440 441 442 443 444 445 446 447
CG-19 CG-56

In Building / Microcells
19 152 153 154 155 156 157 158 159 a 56 448 449 450 451 452 453 454 455
CG-20 20 160 161 162 163 164 165 166 167 b CG-57 57 456 457 458 459 460 461 462 463
CG-21 21 168 169 170 171 172 173 174 175 c CG-58 58 464 465 466 467 468 469 470 471
CG-22 22 176 177 178 179 180 181 182 183 a CG-59 59 472 473 474 475 476 477 478 479
CG-23 23 184 185 186 187 188 189 190 191 b CG-60 60 480 481 482 483 484 485 486 487
CG-24 24 192 193 194 195 196 197 198 199 c CG-61 61 488 489 490 491 492 493 494 495
CG-25 25 200 201 202 203 204 205 206 207 a CG-62 62 496 497 498 499 500 501 502 503
CG-26 26 208 209 210 211 212 213 214 215 b CG-63 63 504 505 506 507 508 509 510 511
CG-27 27 216 217 218 219 220 221 222 223 c
CG-28 28 224 225 226 227 228 229 230 231 a
CG-29 29 232 233 234 235 236 237 238 239 b
CG-30 30 240 241 242 243 244 245 246 247 c
CG-31 31 248 249 250 251 252 253 254 255 a
CG-32 32 256 257 258 259 260 261 262 263 b
CG-33 33 264 265 266 267 268 269 270 271 c
CG-34 34 272 273 274 275 276 277 278 279 a
CG-35 35 280 281 282 283 284 285 286 287 b
CG-36 36 288 289 290 291 292 293 294 295 c
CONFIDENTIAL

Outdoor Macro sites SC Plan (Example)

• For the convenience of displaying


and mapping the 8 reuse patterns onto
the network, 8 individual colors are
assigned to each reuse pattern

R1
R2
R3
R4
R5
R6
R7
R8
CONFIDENTIAL

Scrambling Code Polygon Assignment

ReUse Pattern of 8
Polygons
Repeat same pattern
until entire area is
planned
Even though a perfect
pattern cannot be
maintained in the real
network try to maintain
code group distances to
avoid Interference
CONFIDENTIAL

KV Scrambling Code Polygon Assignment

Example of
KV Re-Use
Pattern of
the 8
Polygons
CONFIDENTIAL

Throughput Calculations: RLC/MAC & LLC Layers

Coding Scheme N (number of bytes) Radio Block Size Radio Block Throughput (bit/s)
CS-1 23 23*8=184 184*50=9200
CS-2 33 33*8=264 264*50=13200
CS-3 39 39*8=312 312*50=15600
CS-4 53 53*8=424 424*50=21200
Table 9. Radio Block Throughput (bits/s). Within the RLC/MAC Layer

Number of TS CS-1 CS-2 CS-3 CS-4


1 9200 13200 15600 21200
2 9200*2=18400 13200*2=26400 15600*2=31200 21200*2=42400
3 9200*3=27600 13200*3=39600 15600*3=46800 21200*3=63600
4 9200*4=36800 13200*4=52800 15600*4=62400 21200*4=84800
Table 10. RLC/MAC Theoretical Maximum Throughput (bits/s)

Number of TS CS-1 CS-2 CS-3 CS-4


1 8000 12000 14400 20000
2 8000*2=16000 12000*2=24000 14400*2=28800 20000*2=40000
3 8000*3=24000 12000*3=36000 14400*3=43200 20000*3=60000
4 8000*4=32000 12000*4=48000 14400*4=57600 20000*4=80000
Table 11. LLC Theoretical Maximum Throughput (bits/s)
CONFIDENTIAL

Slides removed
CONFIDENTIAL

Open-Loop (slow) Power Control

Open-loop power control is used for initial power setting of the


MS at the beginning of a connection. When the mobile
requires access to the network rather than transmit at full
power, as is the case in GSM, it uses the following steps to
avoid causing interference to other users in the cell:

1. The mobile measures the received power from the Base Station.
2. The mobile read the Base Station transmit power from the broadcast
channel.
3. The mobile estimates (calculates) the minimum transmit power necessary
to access the Cell and makes an attempt at a power slightly lower.
4. If this attempt is unsuccessful that is, there is no response from the Base
Station, it will increase the power and re-try.
CONFIDENTIAL

Inner-Loop (fast) Power Control


Power control is also required in call to avoid mobiles transmitting too much
power as they move towards the Base Station. The system must ensure that
the mobile only transmits just enough to be received to avoid unnecessary
interference to other users.
Another reason for this Fast Power Control is to overcome a phenomenon
known as fast or Rayleigh fading, whereby the received signal strength from
moving objects experiences very short duration fades that are dependant on
the radio frequency and the speed of the object.
Once the connection is established, the mobile (uplink) power, can be
controlled by the Base Station by sending power control messages (TPC bits,
are used for the downlink power control as well). The power can be adjusted in
steps of 0.5 dB at a rate of 1500 times per second.
In example below we can see that as Mobile A moves behind the tree it is told
to increase its power by 1 dB. Similarly as Mobile B moves towards the Base
Station it is told to decrease its power by 1dB.
CONFIDENTIAL

Outer-Loop power control


The outer loop power control is needed to keep the quality of
communication at the required level by setting the target, SIR
target or Eb/I0, for the fast power control.
The SIR target for fast control changes in the range of 1 Hz and
is set by the RNC and is based on Bit Error Rate (BER) or
Frame Error Rate (FER).
The outer loop aims at providing the required quality: no worse,
no better, since too high quality would waste the capacity of the
system.
If the received quality in UL is better than the required quality
then the SIR target is decreased. If not then the SIR target is
increased.
In the DL the fastest adjustment of the downlink target is
obtained by having the outer loop power control within the
mobile.

You might also like