+ All Categories
Home > Documents > 1D WCDMA Overview_revised

1D WCDMA Overview_revised

Date post: 25-Dec-2015
Category:
Upload: abuzarshazli
View: 16 times
Download: 1 times
Share this document with a friend
Description:
1D event
Popular Tags:
135
Workshop 1 WCDMA Overview 16/09/2008 Confidential
Transcript
Page 1: 1D WCDMA Overview_revised

Workshop 1WCDMA Overview

16/09/2008

Confidential

Page 2: 1D WCDMA Overview_revised

Presented by:

Simeon [email protected]

014-6690395

Page 3: 1D WCDMA Overview_revised

CONFIDENTIAL

Workshop Contents [WCDMA Overview]WCDMA/UMTS Network Architecture

Core Network Element OverviewMSC, SGSN, GGSN, Iu Interfaces

UTRAN Network Element and Feature OverviewRNC, Node-B

Radio Access Bearer

Introduction to Air-Interface

UMTS-FDD Carriers

Spreading & Processing Gain

Spreading Factor vs. Transmit Power

WCDMA Transmitter- Coding, Interleaving, Spreading

- DL & UL Channelization Codes

- Scrambling Codes

- Modulation, Rake receiver

UMTS Protocol Overview

Channel Organization/Mapping in UMTS

DL Common Control Channel Power Settings

Day 1

Day 2

Page 4: 1D WCDMA Overview_revised

CONFIDENTIAL

WCDMA/UMTS System Objectives

Providing broad range of servicesvoice, video, data with variable rates, and especially multimedia services.

High quality of service with complete security and reliability

Easy and smoothly transition from 2G to 3G, backwards compatibility with 2G

High spectral efficiency

Capable of roaming globally

Page 5: 1D WCDMA Overview_revised

CONFIDENTIAL

WCDMA/UMTS Applications/Functions

Page 6: 1D WCDMA Overview_revised

CONFIDENTIAL

WCDMA/UMTS Network Architecture

Page 7: 1D WCDMA Overview_revised

CONFIDENTIAL

CORE NETWORK ELEMENT OVERVIEW

The CN is responsible for switching and routing calls and data connections to external networks.

It contains the physical entities that provide support for the network features and telecommunications services.

It is also responsible for providing the mobility and location services on the highest level of the UE.

The CN handles both packet-oriented services (such as data) and circuit-oriented services (such as speech).

The UMTS CN can be organised into two main domains:

CS Domain

PS Domain

Page 8: 1D WCDMA Overview_revised

CONFIDENTIAL

CORE NETWORK ELEMENT OVERVIEW (II)

CS domainThis domain offers circuit switched bearer services. The cs domain is mainly used for real time data services, including speech and video transmission.

The network entities MSC, GMSC and VLR can be found here.

PS domainThis domain offers packet switched bearer services. It is based on the GSM feature GPRS.

Originally, this domain was developed for non-real time packet switched applications, such as file transfer, email, access to the Internet. But there are tendencies to improve its offered QoS, so that real time services can be offered, too. The SGSN and GGSN are located in the packet switched domain.

There are also some network elements, which are shared by the packet switched and circuit switched domain.

The common network elements comprise the HLR, AuC and EIR.

A set of network elements were specified for application provisioning, which can be also found in the CN.

Examples are the Camel Service Environment and WAP.

Page 9: 1D WCDMA Overview_revised

CONFIDENTIAL

WCDMA/UMTS Core Network Architecture and Interfaces

CIRCUIT SWTICHED CORE

PSTN/Legacy/External

PACKET SWTICHED CORE

SGSN GGSNMultimedia IP

NetworksGn Gi

MGW

MSC GMSC

HLREIR

DF

AuCC

H

GcGrGf

Gs

RNS

TE MT Node B RNCUu Iub

Iur

TE MT Node B RNCUu Iub

R

R

Iu-ps

Iu-cs

MGWIu-cs

Iu-ps

Page 10: 1D WCDMA Overview_revised

CONFIDENTIAL

MSC SERVER FUNCTIONALITY: Services

Services Supported by the MSCTeleservices

- Telephony, Emergency calls, Originating & Terminating, SMS

Bearer Services- The MSC server supports circuit based data up to 64 kbit/s. It is also possible to

use lower bit rates.Supplementary Services

- Examples include: Line Identification, Call Forwarding, Call Waiting and Call Hold, Multi Party, Closed User, Group, Advice of Charge, Call Barring, Call completion to Busy Subscriber, EMLPP (Enhanced Multi-level Precedence and Preemption).

Unstructured Supplementary Service Data (USSD), as specified in 3GPP

IN in CAMEL- Customized Applications for Mobile Network Enhanced Logic.- The main application of CAMEL is the support of prepaid charging, also referred

to as real-time or on-line charging.

Positioning Service- This service indicates the position of the mobile. Positioning is based on the

transfer of geographical coordinates stored in the MSC Server that uses the MAP and CAP protocols. A translation is performed internally between the position of the cell and the geographical coordinates.

Page 11: 1D WCDMA Overview_revised

CONFIDENTIAL

MSC SERVER FUNCTIONALITY:Control Functions

Connection management

The MSC Server handles circuit-based connection management. Iu control signaling is performed between the MSC Server and UTRAN, while the user plane is set up via media gateways without passing the MSC Server.

In the event that tones, announcements, connection of transcoders, etc., are required, the MSC Server orders the devices to be connected.

Mobility management

Roaming: The MSC Server supports mobility management in order to enable attachment/detachment and roaming within the UMTS network, between UMTS networks, and between UMTS and GSM networks.

Handover: The MSC Server supports intra-MSC SRNS relocation, inter-MSC and intra-MSC handover from UMTS to GSM

Security

Subscriber authentication, Key agreement, Ciphering, Data integrity, Negotiation of algorithm

Charging

Page 12: 1D WCDMA Overview_revised

CONFIDENTIAL

MSC SERVER FUNCTIONALITY:Media Streaming

Coding/decoding

The Transcoder Unit will provide coding/decoding between UTRAN and the UMTS circuit-based Core Network and between UTRAN and the external network.

Echo cancellation

Echo cancellers are provided to attenuate echo generated at the conversion between the 4-wire and 2-wire transmissions in the PSTN and acoustic echo generated in the user equipment.

Tone handling

Devices are provided to send and receive DTMF tones as requested by push-button signals originating in the user equipment. Devices are provided for sending tones such as ringing tones and busy tones, to the mobile subscriber.

Conference Calls

The Conference Call Device (CCD) is provided for bridging multiparty calls.

Announcement machine

Announcement Service Terminals (AST) are provided to make announcements to end-users.

Page 13: 1D WCDMA Overview_revised

CONFIDENTIAL

SGSN Server

The SGSN handles the communication with MSs and the establishment of the connection between an MS and the Packet Data Network.

It forwards IP packets between all GPRS attached MSs within that SGSN service area and the GGSN

SGSN Main Functions

Session management

Mobility management

Subscriber data management

Security

GGSN control signaling

Charging

Admission Control

MAP and RANAP control signaling

SMS

Page 14: 1D WCDMA Overview_revised

CONFIDENTIAL

SGSN SERVER FUNCTIONALITY: Description (1)

Session management:

SGSN functionality for session management is responsible for establishment, maintenance and release of end user PDP contexts.

This includes inter-working with the GGSNs for IP address allocation if dynamic IP addresses are used.

Session management also includes functionality for establishment and release of WCDMA Radio Access Bearers (RAB) for end user IP data transportation.

Mobility management:

Functionality supports intersystem handover within and roaming between mobile networks

Subscriber data management:

SGSN supports the standardized interface to the HLR for management of end user subscriber data such as International Mobile Subscriber Identity (IMSI), Access Point

Names, Subscribed QoS etc.

Security:

It includes subscriber authentication for attach/detach and location update procedures.

Page 15: 1D WCDMA Overview_revised

CONFIDENTIAL

SGSN SERVER FUNCTIONALITY: Description (2)

GGSN control signaling:

The GTP-C protocol for control signaling between SGSN and GGSN is supported. GTP-C is transported by UDP/IP and contains functionality for SGSN - GGSN tunnel management and control.

Charging:

SGSN supports off-line charging with generation of CDRs, and on-line charging according to CAMEL prepaid is supported.

Admission Control:

function is handling the control of the following:

maximum number of simultaneously attached users in the SGSN

maximum bit-rate in the SGSN

The Admission Control function also includes a control of the MS requested QoS profile against the subscribed QoS profile.

MAP and RANAP control signaling:

SGSN supports the RANAP protocol for control signaling over the RNC-SGSN interface for establishment and release of Radio Access Bearers.

SMS:

SGSN treats SMS messages as control traffic, SMS messages can be sent as soon as a control connection has been established and no dedicated RAB is required

Page 16: 1D WCDMA Overview_revised

CONFIDENTIAL

SGSN SERVER Interfaces

Page 17: 1D WCDMA Overview_revised

CONFIDENTIAL

GGSN Server

GGSN is effectively the gateway to external data networks.

It forwards uplink and downlink IP packets between the SGSN and the PDN

The GGSN handles session management, that is, activation, modification, and deactivation of PDP contexts for sessions between the GGSN and the SGSN, and between the GGSN and the PDN.

Session management also includes dynamic IP address allocation and QoS negotiation.

Supports control signaling towards external IP networks for authentication and IP address allocation,

Supports mobility within the mobile network. It communicates with one or several SGSNs.

The GGSN provides functions for forwarding and handling user information (IP packets) to and from external networks (Internet/intranets).

Page 18: 1D WCDMA Overview_revised

CONFIDENTIAL

GGSN FUNCTIONALITY

The main functions of the GGSN are as follows:Session and Mobility management

- The GGSN handles establishment, maintenance and release of PDP contexts that are initiated on request by an SGSN.

- The GGSN includes functionality for intra-PLMN and inter-PLMN routing of IP packets.

IP address allocation

- The GGSN is responsible for allocation of dynamic IP addresses.

- The GGSN can either allocate the IP addresses itself, or interact with a RADIUS server for end user authentication and retrieval of IP addresses.

- Dynamic address allocation enables the use of IP addresses from a common pool of addresses.

Page 19: 1D WCDMA Overview_revised

CONFIDENTIAL

Core Interfaces

Page 20: 1D WCDMA Overview_revised

CONFIDENTIAL

Iuc/ps Function Key Functions

Iucs and Iups provide the control relationships between each of the RNCs and the CS servers (MSC) and PS servers (SGSN)

For IuCS, an RNC can only be controlled by one MSC.

- One MSC can control several RNCs.

For IuPS, an RNC can only be controlled by one SGSN.

- One SGSN can control several RNCs.

The Iu interface, normally uses two parallel STM-1 links connecting the

RNC to the RNSGW in the Core Network. The two links are configured as a redundant pair to protect against both equipment and transmission link faults.

A core network may use the Media Gateway (M-MGw) to perform the role specified for the RNSGW

Page 21: 1D WCDMA Overview_revised

CONFIDENTIAL

UTRANUMTS Terrestrial Radio Access Network

Overview

Page 22: 1D WCDMA Overview_revised

CONFIDENTIAL

UTRAN architecture

Hierarchical Architecture

UTRAN Elements:

- Radio Network Controller

- Node B (Base Station)

UTRAN consists of a set of Radio Network Subsystems (RNS) connected to CN through Iu

Node B connects to RNC through Iub

Iur interface between RNC for soft handover

Page 23: 1D WCDMA Overview_revised

CONFIDENTIAL

RNC roles

Concerning one connection between UTRAN and one UE, the following roles of RNC exists:

Serving RNC (SRNC) that control the connections to a UE

Drift RNC (DRNC) that lends its resources for the Serving RNC for a particular UE

Each RNC also has the controlling role towards its Node Bs (CRNC).

One UE connected to UTRAN has one and only one SRNC

One UE may have zero, one or more DRNCs

Page 24: 1D WCDMA Overview_revised

CONFIDENTIAL

Iur Key Functions

Iur is the Interface connecting 2 RNCs

Supports Inter-RNC Mobility, Soft HandoversDedicated channel traffic, (user data transfer with dedicated connection)

- Allow anchoring of SRNC when UE is in Dedicated channel (DCH) state

Common channel traffic- Allow anchoring of SRNC and also when UE is in common channel

(RACH/FACH) state

Flow control between SRNC and DRNC

• Transfer of positioning parameters between controller

• Transfer of Node B timing information between two RNCs

Anchoring

Iur

Huawei also supports RNC relocation. When UE leaves SHO DRNC becomes SRNC

It establishes a new Iu interface and the Iur is terminated.

Page 25: 1D WCDMA Overview_revised

CONFIDENTIAL

RNC Key Functions

Responsible for processing of user data

Responsible for Radio Resource Management

Comparable to Base Station Controller in GSM

Key RNC Functions:

Closed loop power control

Handover control

Capacity Management (Admission & Congestion Control)

Code allocation

Packet scheduling

Macro diversity combining/splitting over number of Node Bs

Page 26: 1D WCDMA Overview_revised

CONFIDENTIAL

Node-B Key Functions

Comparable to Base Transceiver Station in GSM

Responsible for Air Interface Layer 1

Key Node B Functions:

Inner-loop power control

Modulation and spreading

RF Processing

Rate matching

Micro diversity combining/splitting inside Node B

Page 27: 1D WCDMA Overview_revised

CONFIDENTIAL

RNC & Node-B Feature OverviewPower Ctrl, Handover Ctrl, Capacity Management

Page 28: 1D WCDMA Overview_revised

CONFIDENTIAL

Power Control

Power control is the most important element in DS-CDMA in particular on the uplink.

Because many users access and use the same frequency and bandwidth at the same time, there is a high possibility of interference between the users.

In the case where there is no power control, it may happen that an MS at the cell edge suffers from a higher path loss than another MS that is close to the RBS. If there were no mechanism for the MSs to be power controlled to the same level at the base station, the MS that is closer to the base station could easily over shout the other MS and block a large part of the cell giving rise to the so-called ‘near-far problem’.

In order to maintain good capacity levels in the network, the signals received by the RBS, no matter where the MSs are transmitting from (that is near or far) should be of equal power assuming that all MSs are transmitting at the same user bit rate.

Page 29: 1D WCDMA Overview_revised

CONFIDENTIAL

Three types of power control

1. Open-Loop (slow) power control

2. Inner-Loop (fast) power control and

3. Outer-Loop power control

Page 30: 1D WCDMA Overview_revised

CONFIDENTIAL

Power Control Flow Chart

Page 31: 1D WCDMA Overview_revised

CONFIDENTIAL

Uplink Signal to Interference Ratio (SIR)

SIR is defined (according to 3GPP) = (RSCP/ISCP)*SFWhere:

RSCP = Received Signal Code Power

SF = The spreading factor of the DPCCH

ISCP = Interference Signal Code Power

- ISCP is normally approximated by the RTWP (Received Total Wideband Power)

SIR = (RSCP/RTWP)*SF

Since these terms are normally expressed in dB:

SIR = RSCP – RTWP + 10logSF

To solve for RSCP:

RSCP = RTWP + SIR - 10logSF

Page 32: 1D WCDMA Overview_revised

CONFIDENTIAL

Downlink Signal to Interference Ratio (SIR)

In the downlink transmitter the bits are passed though a 1:2 de-mux

SIR = (RSCP/ISCP)*SF/2Where:

RSCP = Received Signal Code Power

SF = The spreading factor of the DPCCH

ISCP = Interference Signal Code Power

- ISCP is normally approximated by the RTWP (Received Total Wideband Power)

SIR = (RSCP/RTWP)*SF/2

Since these terms are normally expressed in dB:

SIR = RSCP – RTWP + 10log(SF/2)

To solve for RSCP:

RSCP = RTWP + SIR - 10log2/SF

Page 33: 1D WCDMA Overview_revised

CONFIDENTIAL

Handover Introduction

The purpose of handover is to maintain the connection quality while utilizing as little radio resources as possible while the UE moves between cells.

In a Wideband Code Division Multiple Access Radio Access Network (WCDMA RAN) system, there are several types of handover:

Soft/Softer Handover- When the UE is in connected mode, CELL_DCH state. It permits

"neighboring" cells to use the same frequency and the UE to have mobility in order to keep the connection without interruption.

Inter-Frequency Handover:- When the UE in connected mode, CELL_DCH state, is moving out of

coverage of one WCDMA RAN frequency and into coverage of another WCDMA RAN frequency. It will cause some interruptions to the connection (Hard HO)

Inter-Radio Access Technology (Inter-RAT) Handover- When the UE in connected mode, CELL_DCH state, is moving out from

WCDMA RAN coverage into an area where only GSM/GPRS coverage exist. It will cause some interruptions to the connection (Hard HO)

Page 34: 1D WCDMA Overview_revised

CONFIDENTIAL

Handover Introduction (entities involved during the reporting, evaluation, and execution phases)

SHO_Eval: Soft/Softer Handover evaluation algorithm. IFHO_Eval: Inter-Frequency Handover evaluation algorithm. IRATHO_Eval: Inter-RAT Handover (WCDMA RAN to GSM/GPRS) evaluation algorithm. SBHO_Eval: Service Based Handover (WCDMA RAN to GSM for speech users only) evaluation algorithm, as a particular case of IRATHO algorithm. IRATCC_Eval: Inter-RAT Cell Change (WCDMA RAN to GSM/GPRS) evaluation algorithm. CNHHO_Eval: Hard Handover via Core Network evaluation algorithm. HSCC_Eval: HS-DSCH Cell Change evaluation algorithm. Meas_Handl: Measurement handling algorithm. UE_Meas_Eval: UE measurement evaluation algorithm (working in the UE)..

Entities Involved in Reporting, Evaluation, and Execution of Handover-Related Functions.

Page 35: 1D WCDMA Overview_revised

CONFIDENTIAL

Soft/Softer Handover Basics (1)In Soft Handover, the UE connection consists of at least two radio links established with cells belonging to different Radio Base Stations (RBS).

In Softer handover, the UE connection consists of at least two radio links established with cells belonging to the same RBS.

A combination of Soft and Softer Handover is also possible for a UE connection

Data flow is not interrupted during the addition or removal of radio links.

The downlink signals, received by the UE, are combined in the RAKE receiver; that allows for multipath reception and thereby gives protection against fading

Page 36: 1D WCDMA Overview_revised

CONFIDENTIAL

Capacity Management Overview

WCDMA RAN Capacity Management solution controls the load in the WCDMA cell.

This makes it possible for the system to provide the requested QoS and coverage for individual connections.

Each cell or group of cells has its own set of Capacity Management functions responsible for monitoring and controlling the resources of that cell.

The Capacity Management solution consists of three main functions:

Dedicated Monitored Resource Handling

Admission Control

Congestion Control

Page 37: 1D WCDMA Overview_revised

CONFIDENTIAL

Capacity Management Overview

Page 38: 1D WCDMA Overview_revised

CONFIDENTIAL

Capacity Management Functions Overview (1)

Dedicated Monitored Resource Handling

The Dedicated Monitored Resource Handling function is responsible for keeping track of the utilization of critical resources in the system.

The utilization of these resources provides information that is used by Admission and Congestion Control functions to control the cell load.

- It provides information about the current usage of resources that are critical to the load of the cell.

This is done by performing measurements and keeping track of every radio link setup, addition, deletion, and modification in the cell.

Page 39: 1D WCDMA Overview_revised

CONFIDENTIAL

Capacity Management Functions Overview (2)

Admission ControlThe Admission Control function is responsible for controlling the utilization of dedicated monitored resources by accepting or refusing requests for usage of these resources.

Those requests are initiated when setting up new connections, performing (soft) handover, and reconfiguring existing connections.

The decision on accepting or refusing a request takes into account the current load on the dedicated monitored resources and the characteristics of the request.

Congestion Control The Congestion Control function is responsible for detecting and resolving overload situations on certain dedicated monitored resources.

These overload situations can, for example, occur due to fluctuations in the radio conditions for the individual users.

Overload is resolved by a combination of blocking additional admission requests in a cell and issuing congestion resolve actions towards individual users

- for example: switching packet users to lower rates, and releasing connections

Page 40: 1D WCDMA Overview_revised

CONFIDENTIAL

What is the Bearer?

The user traffic, known as the user plane, is carried through the network from the mobile to the core network on a bearer.

In GSM, the traffic channel was the bearer.

In UMTS, a bearer is a varied bit rate and is allocated depending on the needs of the subscriber.

The actual data in the bearer is transparent to the network.

Page 41: 1D WCDMA Overview_revised

CONFIDENTIAL

Bearer CharacteristicsD O C U M E N T T Y P E 1 ( 1 )

M o b i l e P h o n e sT y p e Y o u r N a m e H e r e T y p e D a t e H e r e

C o n v e r s a t i o n a l c l a s s V o i c e a n d v i d e o

S t r e a m i n g c l a s s S t r e a m i n g v i d e o

I n t e r a c t i v e c l a s s W e b b r o w s i n g

B a c k g r o u n d c l a s s M a i l d o w n l o a d i n g

Page 42: 1D WCDMA Overview_revised

CONFIDENTIAL

Types of bearer

A bearer has different parameters, such as variable data rates, protection and delay.

The bearer is dependent on the service required.

VoiceVoice Messages

MessagingTransactionalInfoservices

WWW browsingIntranet accessDownloading

Audio/Video Streaming

0 8 16 32 48 64 80 96 112 128 256 384 kbit/s

Video telephony

Page 43: 1D WCDMA Overview_revised

CONFIDENTIAL

Relationship between the RAB and Signaling Protocols

As the bearer is passing through the network elements, we need to control its activities.

One network element must be capable of sending and receiving messages to other network elements (Node B to RNC, RNC to CN and RNC to RNC).

This is called signaling.

Standardized signaling protocols specify how two pieces of equipment can communicate and understand messages.

The figure below illustrates the user plane information between the terminal and the core network through the network by use of the RAB.

Page 44: 1D WCDMA Overview_revised

CONFIDENTIAL

UMTS Planes

Transport plane protocols:

Transport plane provides the means how the physical connection is established between the User Equipment (UE) and the network.

Provides a reliable connection between two end nodes. Is responsible for the transport of higher layer data

User plane protocols:

Protocols implementing the radio access bearer service carrying user data through the access stratum (parallel layers).

Control plane protocols:

Protocols for controlling the radio bearers and the connection between the User Equipment (UE) and the network from different aspects (including requesting the service, controlling different transmission resources, handover, and so on).

Page 45: 1D WCDMA Overview_revised

CONFIDENTIAL

Transport Plane Iu-PS, Iu-CS, Iur, & Iub:

Physical Layer

ATM

AAL2

Service:• Variable bit rate• Source & destination

synchronised• connection orientated

AAL5

Service:• Variable bit rate• Source & destination

not synchronised• connection orientated

control data

Iu-CS, Iu-PS, Iur, Iub

user dataIu-PS

user data

Iu-CS, Iur, Iub

Page 46: 1D WCDMA Overview_revised

CONFIDENTIAL

RAN interfaces & Functions Summary

BS Functions: - Modulation - Rate Matching - Error Protection in Uu Interface - Uu Interface Channelisation - Macro Diversity (Softer Handover)

Uu Interface:Transport Plane

Control Plane

User Plane

Procedures

- WCDMA (Wideband Code Division Multiple Access) - DPDCH and DPCCH Channels - Optimised, application-related protocols suitable for both packet and circuit switched traffic - Radio Link (RL) Setup - RL Reconfiguration - RL Addition - RL Deletion - Radio Access Bearer Mgmt

Iub Interface:Transport Plane

Control Plane

User Plane

Procedures

- ATM - Communication Control Ports - Node B Control Ports - RACH/FACH/DCH Data Ports forming UE Context(s) - Radio Link (RL) Setup - RL Reconfiguration - RL Addition - RL Deletion - Power Control Information - Handover Signalling - Measurement Reports

Iur Interface:Transport Plane

Control Plane

User Plane

Procedures

- ATM - SCCP over CCS7 - Frame Protocols for Dedicated Channels over ATM - Radio Link (RL) Setup - RL Reconfiguration - RL Addition - RL Deletion - Power Control Information - Handover Signalling - Measurement Reports

Iu Interface for CN Packet Domain: Transport Plane

Control Plane

User Plane

Procedures

- ATM - RANAP over CCS7 or IP - GTP (GPRS Tunnelling Protocol) over UDP/IP over AAL5 - Radio Access Bearer Management - SRNC Relocation - Direct Transfer Procedures (Direct Signalling between UE and the CN Packet Domain)

Iu Interface for CN Circuit Domain: Transport Plane

Control Plane

User Plane

Procedures

- ATM - RANAP over CCS7

- Optimised, application-related protocols over ATM AAL2

- Radio Access Bearer Management - SRNC Relocation - Direct Transfer Procedures (Direct Signalling between UE and the CN Circuit Domain)

4

BS

BS RNC

RNC

RNC Functions: Radio Resource Management

Telecommunication Management

- Admission Control - Code Allocation - Load Control - Power Control - Handover Control (HO) - Macro Diversity (Soft HO) - Radio Access Bearer (RAB) - RAB - Radio Link Mapping

Page 47: 1D WCDMA Overview_revised

CONFIDENTIAL

UTRAN OverviewIntroduction to Air-Interface

Page 48: 1D WCDMA Overview_revised

CONFIDENTIAL

UTRAN Interfaces UTRAN DefinitionsRNS (Radio Network

Subsystem)A full or partial network offering access between UE and Core NetworkContains one RNC

RNC (Radio Network Controller)

Element of the RNS that controls physical radio resources

Node BLogical Node controlling transmission and reception from one or more cells

Iub InterfaceInterface between RNC and Node B

Uu InterfaceInterface between UE and Node B

Iur InterfaceInterface between one RNS and another RNS

Iu InterfaceInterface between CN and RNS

Page 49: 1D WCDMA Overview_revised

CONFIDENTIAL

WCDMA Direct Sequence CDMA (DS-CDMA)

WCDMA/UMTS uses Direct Sequence CDMA (DS-CDMA), the information for each user is spread with a unique code.

Separate Users through different Codes

Provides large bandwidth

Provides continuous transmission and reception

CDMA is also known as a Spread Spectrum Technology.

Page 50: 1D WCDMA Overview_revised

CONFIDENTIAL

UMTS-FDD Carriers

DiGi Carriers

Ch. Number (UARFCN UL/DL = Carrier Center Freq * 5 = 2112.4*5 =10562

Others Operator CarriersCarrier 1 Carrier 2 Carrier 3

Uplink 1920 1925 1930Downlink 2110 2115 2120

Uplink 9612 9637 9662Downlink 10562 10587 10612

Uplink 1935 1940 1945Downlink 2125 2130 2135

Uplink 9687 9712 9737Downlink 10637 10662 10687

Uplink 1950 1955 1960Downlink 2140 2145 2150

Uplink 9762 9787 9812Downlink 10712 10737 10762

U Mobile

Maxis

CelcomMHz

Ch. Number

MHz

Ch. Number

MHz

Ch. Number

Carrier 1 Carrier 2 Carrier 3Uplink 1965 1970 1975

Downlink 2155 2160 2165Uplink 9837 9862 9887

Downlink 10787 10812 10837

DiGiMHz

Ch. Number

Page 51: 1D WCDMA Overview_revised

CONFIDENTIAL

WCDMA terminology – Bits, Symbols, & Chips

Terms: Bit, Symbol, Chip Bit : data after source coding

Symbol: data after channel coding and interleaving

Chip: data after spreading

Processing Procedure of WCDMA System

Page 52: 1D WCDMA Overview_revised

CONFIDENTIAL

SPREADING WITH CODES

The process of spreading

A bit of information is a ‘1’ or a ‘0’ (digital) or a ‘-1’, ‘+1’ (analogue).

The user information bits are spread into a number of chips when it is “multiplied” with the spreading code (which is unique).

- The chip rate for the system is constant 3.84 Mchip/s

- and the signal is spread into a bandwidth of 5 MHz.

The Spreading Factor (SF) is the ratio between the chip rate and the symbol rate.

- This is equal to the spreading gain (i.e. the protection against interference).

The same code is used to dispread the information after it is sent over the air interface, i.e. both the UE and the RBS use the same codes.

Different bit rates and Spreading Factors at a constant chip rate

Page 53: 1D WCDMA Overview_revised

CONFIDENTIAL

Spreading Factor & Processing Gain

FrequencyPow

er

den

sity

(W

att

s/H

z)

Unspread narrowband signal Spread wideband signal

Bandwidth W (3.84 Mchip/sec)

Bit rate R

sec84.3 MchipWconstSFR

SFR

W

B

BdBG

Baerer

Up

u Gp: processing gainBUu: system chip rateBBearer: bearer symbol rateSF: spreading factor

Page 54: 1D WCDMA Overview_revised

CONFIDENTIAL

Processing Gain Examples

Voice user (R=12,2 kbit/s)

Packet data user (R=384 kbit/s)

Pow

er

den

sity

(W

/Hz)

R

Frequency (Hz)

Gp=W/R=24.98 dB

Pow

er

den

sity

(W

/Hz)

R

Gp=W/R=10 dB

• Spreading sequences have a different length• Processing gain depends on the user data rate

=10log10 (3.84^6/12.2^3)

Page 55: 1D WCDMA Overview_revised

CONFIDENTIAL

Transmission Power

To send a stream of bits, a certain power is needed.

The bit rate has a constant relationship to the power level and if the bit rate is high, then the power level becomes high and vice versa

Frequency

5MHz

Power

Time

High bit rate user

Low bit rate user

Page 56: 1D WCDMA Overview_revised

CONFIDENTIAL

Spreading Factor vs. Power

Since the chip rate is constant, the spreading factor is low when the bit rate is high.

One of the most important characteristics of WCDMA is the fact that power is the common shared resource.

Imagine like a box with fix volume

• When SF Increases Power decreases

• When SF decreases Power increases

Page 57: 1D WCDMA Overview_revised

CONFIDENTIAL

Eb/No and Processing Gain

Eb/N0 (the energy per bit to noise power spectral density ratio) is an important parameter in digital communication or data transmission

In 3G radio network planning and system dimensioning typically make use of the terms Eb/No and Processing Gain (PG).

defines the required and achieved carrier to interference (C/I) ratio i.e. C/I = Eb/No - PG.

Both Eb/No and PG are relatively conceptual and are not quantities that can be measured directly.

Eb/No is provided by the equipment vendors for the Uplink and Downlink, for the different CS and PS services and for the different channel model types (i.e. TU3, TU50, RA50 etc)

Table below are the Eb/No values used by Huawei

UL DL

AMR12.2 5.4 7.8

CS64 2.8 6.3

PS64 2.6 4.8

PS128 2.3 4.7

PS384 1.8 3.8

Huawei's Required Eb/No (dB)

Page 58: 1D WCDMA Overview_revised

CONFIDENTIAL

Processing Gain and Eb/No Example

Processing gain is what gives CDMA systems the robustness against self-interference that is necessary in order to reuse the available 5 MHz carrier frequencies over geographically close distances.

Let’s take an example with real WCDMA parameters.

Speech service with a bit rate of 12.2 kbps has a processing gain of 25 dB, 10log10 (3.84e6/12.2e3).

After dispreading, the signal power needs to be typically a few decibels above the interference and noise power.

The required power density over the interference power density after dispreading is designated as Eb/No, where Eb is the energy, or power density, per user bit and No is the interference and noise power density.

For speech service Eb/No is typically in the order of 7.0 dB, and the required wideband signal-to-interference ratio is therefore 7.0 dB minus the processing gain is 18.0 dB.

In other words, the signal power can be 18 dB under the interference or thermal noise power, and the WCDMA receiver can still detect the signal.

Kbps PG12.2 25.064 17.8

128 14.8384 10

Processing Gain

PG=10log(chip/bit rate)

Page 59: 1D WCDMA Overview_revised

CONFIDENTIAL

WCDMA Transmitter

Pulse Shaping

Filter

Pulse Shaping

FilterRF Out

Data Channel

1

Data Channel

N

Linear

Summation

Linear

Summation

Spread Spectrum Code

(PN Code or Gold Code)FEC

Coding

FEC Coding

Orthogonal Code 1

Orthogonal Code N

1:2Demux

1:2Demux

Pulse Shaping

Filter

Pulse Shaping

Filter

I/Q Modulat

or

I/Q Modulat

or

CRC Coding

CRC Coding Inter-

leaving

Inter-leaving

CRC Coding

CRC Coding

Complex Multipli

er (I + jQ)

Complex Multipli

er (I + jQ)

FEC Coding

FEC Coding Inter-

leaving

Inter-leaving

D/AD/A

D/AD/A

SSC_QSSC_I

I

Q

I

Q

I

Q

Allows for error

detection in the receiver

Allows for error correction in the receiver

Improves error

correction in the

receiver

Gives a unique

identity to each data

stream

Maps digital bits to analog signals

0 +1

1 -1

Provides 2x higher data rate

(WCDMA,cdma2000 downlink)

Gives a unique

identity to this

transmitter

Contains transmitt

ed frequency spectrum

Allows both signals from 1:2 Demux to share

the same RF bandwidth

Pre-coded data (bits)

Symbols Chips

+

+

CRC: Cyclic Redundancy CheckFEC: Forward Error Correction

Add CRC to Transport Block

Channel Coding:Convolutional or TurboStarts here

Page 60: 1D WCDMA Overview_revised

CONFIDENTIAL

Air interface: Coding, Interleaving, Spreading

The number of chips per data symbol is called the Spreading Factor (SF).

The lower the spreading factor the higher the data rate.

SF value varies in FDD from 4 to 512.

Page 61: 1D WCDMA Overview_revised

CONFIDENTIAL

WCDMA Channel Coding

During the transmission, there are many interferences and fading.

To guarantee reliable transmission, system should overcome these through the channel coding which includes convolution and interleaving.

Convolution that is used for overcome interference. Through the technology, many redundant bits will be inserted in original information.

When error code is caused by interference, the redundant bits can be used to recover the original information.

3 types of Channel Coding are possible [per code block of N bits]1/2 rate convolutional channel coding [2N + 16 bits], coded information1/3 rate convolutional channel coding [3N + 24 bits]turbo coding [3N + 12 bits]

Convolution code applies to voice service while Turbo code applies to high rate data service.

Channel Coding Increases the delay

Page 62: 1D WCDMA Overview_revised

CONFIDENTIAL

InterleavingInterleaving ‘spreads out’ consecutive bits in time

Reduces the probability of losing consecutive bits

Convolutional encoding is sensitive to consecutive bit loss

Trades delay time for data protection

Longer interleaving periods have better data protection with more delay

Interleaving periods:10, 20, 40, or 80 ms

Most coding schemes perform better on random data errors than on blocks of errors.

By interleaving the data, no two adjacent bits are transmitted near to each other, and the data errors are randomized.

Page 63: 1D WCDMA Overview_revised

CONFIDENTIAL

Spreading Codes in WCDMA

In WCDMA, two types of codes are used in tandem for spreading the channel bits into a wideband CDMA chip sequence:

channelization codes, and

scrambling codes.

after spreading the scrambling code only modifies the chip values in the transmitted chip sequence in such a way that the cross-correlation interference in the system is minimised.

the channelization code performs the actual signal spreading to the final chip rate (3.84 Mchips/s)

Page 64: 1D WCDMA Overview_revised

CONFIDENTIAL

DL & UL Channelization CodesChannelization codes, or Walsh Codes, are often referred to as Orthogonal Variable Spreading Factor (OSVF)

SF for the DL transmission in FDD mode = {4, 8, 16, 32, 64, 128, 256, 512}

SF for the UL transmission in FDD mode = {4, 8, 16, 32, 64, 128, 256} - A lower SF means a higher data rate, because this means less chips per symbol

- PS384 kbps (DL) SF=8 => 8 chips per symbol

- AMR12.2 kbps (DL) SF=128 => 128 chips per symbol

The codes have orthogonal properties to minimize the interference between different users.

Two vectors that are orthogonal give the resulting vector 0, when they are multiplied with each other.

This means that the coded information is only affected by the “right” orthogonal code when it is dispread.

In this way the interference can be minimized.

The channelization codes preserve the orthogonality between the different physical channels of users even if they operate at different bit rates

Orthogonal codes are suited for channel separation, where synchronisation between different channels can be guaranteed, e.g.

downlink channels under one cell,

uplink channels from a single user;

- uplink signals from different users are not time synchronised.

Page 65: 1D WCDMA Overview_revised

CONFIDENTIAL

Channelization codes

Channelization codes are very important in downlink, since they are used for multiplexing (at the transmitter) and separating (at the receiver) the signals intended for different terminals.

In uplink, channelization codes are used for multiplexing the data and control channel (DPDCH and DPCCH) signals transmitted from a single terminal.

In both directions, the channelization codes are employed for spreading the channel bits to the final chip rate of 3.84 Mchips/s.

The required bit rate - and thus the spreading factor - of some services may change over time. The transmitter takes care of changes in the spreading factor among others by changing the channelization code.

The channelization codes are based on the Orthogonal Variable Spreading Factor (OVSF) technique, which allows the spreading factor to be changed without disrupting the orthogonality between different codes of different lengths simultaneously in use.

Page 66: 1D WCDMA Overview_revised

CONFIDENTIAL

Channelization Code Tree

C0(0)=[1]

C2(1)=[1-1]

C2(0)=[11]

C4(0)=[1111]

C4(1)=[11-1-1]

C4(2)=[1-11-1]

C4(3)=[1-1-11]

C8(0)=[11111111]

C8(1)=[1111-1-1-1-1]

C8(2)=[11-1-111-1-1]

C8(3)=[11-1-1-1-111]

C8(0)=[1-11-11-11-1]

C8(5)=[1-11-1-11-11]

C8(6)=[1-1-111-1-11]

C8(7)=[1-1-11-111-1]

C16(0)=[............]C16(1)=[............]

C16(15)=[...........]

C16(14)=[...........]

C16(13=[...........]

C16(12)=[...........]

C16(11)=[...........]

C16(10)=[...........]

C16(9)=[............]

C16(8)=[............]

C16(7)=[............]

C16(6)=[............]

C16(5)=[............]

C16(4)=[............]

C16(3)=[............]

C16(2)=[............]

SF=1

SF=2

SF=4

SF=8

SF=16

SF=256

...

Page 67: 1D WCDMA Overview_revised

CONFIDENTIAL

Tree of Orthogonal Channelization Codes in Downlink

C1(0) = [ 1 ]

C2(0) = [ 1 1 ]

C2(1) = [ 1 0 ]

C4(0) = [ 1 1 1 1 ]

C4(1) = [ 1 1 0 0 ]

C4(2) = [ 1 0 1 0 ]

C4(3) = [ 1 0 0 1 ]

C8(0) = [ 1 1 1 1 1 1 1 1 ]

C8(1) = [ 1 1 1 1 0 0 0 0 ]

. . .

. . .

Spreading factor:

SF = 1 SF = 2 SF = 4 SF = 8

C8(2) = [ 1 1 0 0 1 1 0 0 ]

C8(3) = [ 1 1 0 0 0 0 1 1]

. . .

. . .

C8(4) = [ 1 0 1 0 1 0 1 0 ]

C8(5) = [ 1 0 1 0 0 1 0 1 ]

. . .

. . .

C8(6) = [ 1 0 0 1 1 0 0 1 ]

C8(7) = [ 1 0 0 1 0 1 1 0 ]

. . .

. . .

SF 4

SF 8

SF 16

384 user #1128 user #1

384 user #2

Signaling

The codes have orthogonal properties to minimize the interference between different users.Channelization

codes of different length, depending of the bit rateEnsures

orthogonality even with different rates and spreading factors

Channelization Code Tree

Page 68: 1D WCDMA Overview_revised

CONFIDENTIAL

DL Primary Scrambling Code

The data stream after the channelization codes, multiplied by a code from a group of special binary codes, to distinguish between different transmitters.

UMTS uses 512 primary scrambling codes, divided into 64 groups of 8

The Common Pilot Channel (CPICH) is an unmodulated code channel, which is scrambled with the cell-specific primary scrambling code.

One DL scrambling code is used per sector in the base station, and it makes the signals from different sources separable from each other.

The DL Scrambling code is used in the cell selection, reselection, and handover process by the UE to distinguish the desired cell.

Page 69: 1D WCDMA Overview_revised

CONFIDENTIAL

KV Scrambling Code Group Plan

15 Sites per Group

Page 70: 1D WCDMA Overview_revised

CONFIDENTIAL

Where are codes used?

In the Uplink

(UE Node B),

the user's data and signaling information is

separated by Channelization

Codes

datasignaling

In the Downlink

(Node BUE),

cells are separated by

Scrambling Codes

In the Uplink

(UE Node B),

terminals are separated by

Scrambling Codes

In the Downlink

(Node B UE),

user connections are separated by Channelization

Codes

Dedicated User Channel

Page 71: 1D WCDMA Overview_revised

CONFIDENTIAL

Channelization and Scrambling Code Summary

Channelization code Scrambling code

Usage Uplink: Separation of physical data and control channels from the same terminal

Downlink: Separation of downlink dedicated user channels

Uplink: Separation of terminals

Downlink: Separation of sectors (cell)

Length Variable (depends on the user allocation)

Fixed

Number of codes

Depends on the spreading factor (SF)

Uplink: Several million

Downlink: 512

Page 72: 1D WCDMA Overview_revised

CONFIDENTIAL

Air interface - Modulation

QPSK

2 bits / symbol =480 kbit/s/HS-PDSCH =

max. 7.2 Mbit/s

16QAM

4 bits / symbol =960 kbit/s/HS-PDSCH =

max. 14.4 Mbit/s

1011

1001

1000

1010

0001

0011

0010

0000

0100

0110

0111

0101

1110

1100

1101

1111

Q

I

10 00

0111

Q

I

• RF communication systems use advanced forms of modulation to increase the amount of data that can be transmitted in a given amount of frequency spectrum

QPSK uses four phases

They are positioned on a circle so that they can all be transmitted with the same energy This gives maximum phase-separation between adjacent points and thus the best immunity to corruption Can encode two bits per symbol to minimize the BER

The higher order modulations need a much better SNR because when an error occurs on one symbol, more bits are lost.

Example: EDGE (Enhanced Data rates for GSM Evolution) uses an 8-PSK modulation scheme. It can provide data rates up to 380 kbps, but only for users close to the base station (in a 100 m radius approximately),

In UMTS, a spread spectrum modulation is used. It is made of two stages:Symbol modulation based on spread spectrum symbols. Each symbol is modulated by several chips,

Chip modulation based on a simple narrow band modulation. This is a classical PSK modulation.

Page 73: 1D WCDMA Overview_revised

CONFIDENTIAL

Rake Receiver

CDMA uses the multipath signals and combines them to make an even stronger signal at the receivers due to its wide bandwidth and Rake receivers

It is essentially a set of four or more receivers

One of the receivers (fingers) constantly searches for different multipath and helps the other 3 fingers to lock into strong multipath signals which have more than one chip delay

Each finger then demodulates the signal corresponding to a strong multipath and then the results are combined together to make a stronger signal

Page 74: 1D WCDMA Overview_revised

CONFIDENTIALMicro/Macro Diversity Combining

Micro Diversity Pointsmax ratio combining is used

Summed signalNode B RAKE

Receiver

MS RAKE

Receiver

Node B

Node B

Node B

S-RNC

D-RNC

Core Network

Active cell set

Macro Diversity Pointselection combining is used

Page 75: 1D WCDMA Overview_revised

CONFIDENTIAL

UMTS Channel Mapping

Page 76: 1D WCDMA Overview_revised

CONFIDENTIAL

UMTS Channel Terminology

Downlink – Transmitted by UTRAN, received by UE.

Uplink – Transmitted by UE, received by UTRAN.

Common – Carries information to/from multiple UEs.

Dedicated – Carries information to/from a single UE.

Logical – Defined by what type of information is transferred, e.g., signaling or user data.

Transport – Defined by how data is transferred over the air interface, e.g., multiplexing of Logical Channels.

Physical – Defined by physical mappings and attributes used to transfer data over the air interface, e.g., spreading rate.

Page 77: 1D WCDMA Overview_revised

CONFIDENTIAL

Radio Interface Protocol Architecture (in UE)

Radio Resource Control (RRC)

Packet Data Convergence Protocol (PDCP)

Broadcast/Multicast Control (BMC)

Radio Link Control (RLC)

Medium Access Control (MAC)

Layer 1 or Physical Layer (PHY or L1)

Radio Bearers – Carry signaling between RRC and RLC or carry user data from application layers to Layer 2.

Logical Channels – Carry signaling and user data between RLC and MAC.

Transport Channels – Carry signaling and user data between MAC and PHY.

Physical Channels – Carry signaling and user data over the radio link.

Page 78: 1D WCDMA Overview_revised

CONFIDENTIAL

UMTS Channel Organization

UENode B

RNC

Logical channels

Transport channels

Physical channels

Frames

In UMTS there are three different types of channels

Page 79: 1D WCDMA Overview_revised

CONFIDENTIAL

Radio Interface Channel Description

: Logical ChannelsLogical Channels were created to transmit a specific content. There are for instance logical channel to transmit the cell system information, paging information, or user data.Logical channels are offered as data transfer service by the Medium Access Control (MAC) layer to the next higher layer. Consequently, logical channels are in use between the mobile phone and the RNC. Transport Channels (TrCH)The MAC layer is using the transport service of the lower, Physical layer. The MAC layer is responsible to organise the logical channel data on transport channels. This process is called mapping. In this context, the MAC layer is also responsible to determine the used transport format. The transport of logical channel data takes place between the UE and the RNC. Physical Channels (PhyCH)The physical layer offers the transport of data to the higher layer. The characteristics of the physical transport have to be described. When we transmit information between the RNC and the UE, the physical medium is changing.Between the RNC and the Node B, where we talk about the interface Iub, the transport of information is physically organised in so-called Frames.Between the Node B and the UE, where we find the WCDMA radio interface Uu, the physical transmission is described by physical channels. A physical channel is defined by the UARFCN and the a spreading code in the FDD mode.

Page 80: 1D WCDMA Overview_revised

CONFIDENTIAL

Downlink channel mapping

SCH-1/SCH-2 (created in NodeB)

BCCH

BCH

PCCH

PCH

CCPCH-1

CCCH

FACH

CCPCH-2

DCCH

(DPDCH+DPCCH)

DTCH Logical Channels

Transport Channels

Physical ChannelsDPCH

CTCH

DCH DSCH

PDSCHSCH-1/SCH-2 (created in NodeB)

BCCH

BCH

PCCH

PCH

CCPCH-1

CCCH

FACH

CCPCH-2

DCCH

(DPDCH+DPCCH)

DTCH Logical Channels

Transport Channels

Physical ChannelsDPCHDPCH

CTCH

DCH DSCH

PDSCH

Logical Channels:Control Channels (CCH):

Broadcast Control Channel (BCCH)Paging Control Channel (PCCH)Common Control Channel (CCCH)Dedicated Control Channel (DCCH)

Traffic Channels (TCH): Dedicated Traffic Channel

(DTCH)Common Traffic Channel

(CTCH)

Transport Channels: Common Transport Channels:

Broadcast Channel (BCH)Paging Channel (PCH)

Forward Access Channel (FACH)Downlink Shared Channel (DSCH)Random Access Channel (RACH)

Common Packet Channel (CPCH)Dedicated Transport Channels:

Dedicated Channel (DCH)

Physical Chs: characterised by

UARFCN,scrambling code,channelization code (optional),start and stop time, andrelative phase

Page 81: 1D WCDMA Overview_revised

CONFIDENTIAL

Uplink channel mapping

CCCH

PRACH

RACH

DTCH

DPDCH

DCH

DCCH

DPCCH PCPCH

CPCH

Logical Channels

Transport Channels

Physical Channels

Logical Channels:Control Channels (CCH):

Common Control Channel (CCCH)

Dedicated Control Channel (DCCH)

Traffic Channels (TCH): Dedicated Traffic Channel

(DTCH)

Transport Channels: Common Transport Channels:

Random Access Channel (RACH)Common Packet Channel

(CPCH)Dedicated Transport Channels:

Dedicated Channel (DCH)

Physical Chs: characterised by

UARFCN,scrambling code,channelization code (optional),start and stop time, andrelative phase

Page 82: 1D WCDMA Overview_revised

CONFIDENTIAL

Broadcast Channel

Broadcast Channel (Downlink)

Broadcast Control Channel (BCCH) [Logical/L3]

Broadcast Channel (BCH) [Transport/L2]

Primary Common Control Physical Channel (PCCPCH) [L1]

First channel to be decoded by UE after acquisition

Carries system information such as system ID, cell ID, neighbor cell information, system frame number, etc.

The BCCH Logical Channel carries system information messages necessary for the UE to camp on a WCDMA cell and to access the system.

UTRAN broadcasts this channel continuously, repeating the system information messages at a system configurable repetition rate.

The UE typically reads this channel after power-up or when camping on a new cell and periodically thereafter to ensure that the UE has current system information.

Page 83: 1D WCDMA Overview_revised

CONFIDENTIAL

Paging Channel

Paging Channel (Downlink)

Paging Control Channel (PCCH)

Paging Channel (PCH)

Secondary Common Control Physical Channel (SCCPCH)

Page Indicator Channel (PICH)

Monitored by UE in Idle Mode, CELL_PCH, and URA_PCH

Carries Paging messages

The PCCH Logical Channel carries paging messages to notify the UE of incoming calls. It is used in conjunction with the physical Page Indicator Channel (PICH).

UTRAN broadcasts the PCH continuously, but the UE typically only monitors the PICH during assigned slots

Page 84: 1D WCDMA Overview_revised

CONFIDENTIAL

Random and Forward Access ChannelsRandom Access Channel (Uplink)

Common Control Channel (CCCH) [Logical/L3]

Random Access Channel (RACH) [Transport/L2]

Physical Random Access Channel (PRACH)

Transmitted by UE to access the system

Forward Access Channel (Downlink)

Common Control Channel (CCCH)

Forward Access Channel (FACH)

Secondary Common Control Physical Channel (SCCPCH)

Acquisition Indication Channel (AICH)

Carries UTRAN messages to UE in Idle mode

These Uplink and Downlink Channels are used by the UE and UTRAN to communicate when the UE does not have a Dedicated Channel allocated to it.

The RACH has an access protocol associated with it, in which the UE transmits a preamble at increasing power levels until the UTRAN responds on the AICH.

When UTRAN receives a message from the UE on RACH, it responds on FACH. The FACH Transport Channel is mapped to an SCCPCH.

Page 85: 1D WCDMA Overview_revised

CONFIDENTIAL

Dedicated Channels

Dedicated Channels (Uplink/Downlink)Dedicated Control Channel (DCCH)

[Logical/L3]

Dedicated Traffic Channel (DTCH) [Logical/L3]

Dedicated Channel (DCH) [Transport/L2]

Dedicated Physical Data Channel (DPDCH)

Dedicated Physical Control Channel (DPCCH)

Carries signaling and user data

These Uplink and Downlink Channels are used to carry signaling and user data between the UTRAN and an individual UE.

These channels are assigned when a voice call is active or when a packet data call is transferring data.

Page 86: 1D WCDMA Overview_revised

CONFIDENTIAL

Frame Structure and TimingFrame Timing

Transmission Time Interval (TTI)

- TTI: 10, 20, 40, 80 ms boundaries

10 ms radio frames, 15 slots per frame

38400 chips per frame

Super Frame = 72 Frames = 720ms

Slot Timing2560 chips per slot, 0.67 ms

Symbol TimingSymbol consists of a number of chips

OVSF determines chips/symbol

OVSF ranges from 4 to 512 chips/symbol

(640 to 5 symbols per slot)

- AMR12.2kbps: SF=128 => 128 chips/symbol => 640/128=5 symbols/slot

- PS384kbps: SF=8 => 8 chips/symbol => 640/8=5=80 symbols/slot

At the 3.84 x 10^6 chipping rate => 38,400 chips per 10 ms Frame => 2560 chips per slot.

Page 87: 1D WCDMA Overview_revised

CONFIDENTIAL

Uplink Frame Structure for DPDCH and DPCCH

UL DPCH is two Physical Channels: the DPDCH and the DPCCH.

UL Dedicated Physical Data Channel (DPDCH) sent on I branch.

UL Dedicated Physical Control Channel (DPCCH) sent on Q branch.

The control information consists of:

pilot bits to support channel estimation for coherent detection

transmit power-control (TPC) commands,

feedback information (FBI)

optional transport format combination indicator (TFCI)

Each frame of length 10 ms is split into 15 slots,

Each of length Tslot = 0.667 ms, corresponding to one power-control period.

A super frame corresponds to 72 consecutive frames, i.e. the super-frame length is 720 ms.

Page 88: 1D WCDMA Overview_revised

CONFIDENTIAL

Downlink Frame Structure for DPDCH and DPCCH

There is only one type of downlink dedicated physical channel, the Downlink Dedicated Physical Channel (downlink DPCH).

Within one downlink DPCH, i.e. the dedicated transport channel (DCH), is transmitted in time-multiplex with control information (known pilot bits, TPC commands, and an optional TFCI).

The downlink DPCH can thus be seen as a time multiplex of a downlink DPDCH and a downlink DPCCH.

The control information consists of:

pilot bits to support channel estimation for

coherent detection

transmit power-control (TPC) commands,

feedback information (FBI)

optional transport format combination indicator (TFCI)

Page 89: 1D WCDMA Overview_revised

CONFIDENTIAL

System Information Messages

Page 90: 1D WCDMA Overview_revised

CONFIDENTIAL

System Information Messages

The BCCH (Logical Ch) is mapped to the BCH (TrCh).

The Node-B continuously transmits the SIBs in system information messages on the BCH

A UE is always able to find the MIB on the BCCH and to get the scheduling information for the other SIBs

The SIBs contain all information necessary for UEs to work properly in both Idle and Connected mode

UE timers and counters, Cell selection and reselection parameters, Common Physical Channel parameters, Measurement parameters, Neighbor list parameters

Contents MIB SIB1 SIB3 SIB5 SIB7 SIB11 SIB 12PLMN identity XCell selection and reselection parameters X XPaging parameters X XMeasurement management X XCell and common channel configuration XTimers and counters in Idle and Connected mode

X

Power control on common channel XLA and RA updating XSIB Scheduling Information X

Page 91: 1D WCDMA Overview_revised

CONFIDENTIAL

System Information Structure

The System Information elements are broadcast in System Information Blocks (SIBs).

SIB groups together System Information elements related to the same kind of activity controls.

Different types of SIB exist, and each type contains a specific collection of information.

The SIBs are organized as a tree, as shown below.

A MIB gives reference to a number of SIBs, and its functions include scheduling information for those SIBs.

Page 92: 1D WCDMA Overview_revised

CONFIDENTIAL

NEMO BCH, MIB, SIB (1)

Page 93: 1D WCDMA Overview_revised

CONFIDENTIALNEMO BCH, MIB, SIB (2) Cell Selection and Reselection

Parameters

{[-173 (thermal noise density)] – (-58)}

= -115 (qRxLevMin)

Page 94: 1D WCDMA Overview_revised

CONFIDENTIAL

NEMO BCH, MIB, SIB (3)

Page 95: 1D WCDMA Overview_revised

CONFIDENTIAL

NEMO BCH, MIB, SIB (4)

Cell & Common Channel Configuration

Page 96: 1D WCDMA Overview_revised

CONFIDENTIAL

DL Common Control Channel Power Settings

Page 97: 1D WCDMA Overview_revised

CONFIDENTIAL

DL Common Control Channel Power Settings

Power Settings for the different downlink common channels that are controlled through cell setup and cell reconfiguration.

These include Primary Common Pilot Channel (PCPICH),

Synchronization Channel (SCH)

Primary Common Control Physical Channel (PCCPCH),

DL Common control channels must be heard over the whole cell, thus their power setting is designed for “cell edge”.

DL Common Channels does not have a power control

The power of the common physical channels are set relative to the CPICH:

Power Settings: Actual settings in OSS (Huawei Recommended)

Avr.Pwr (dBm/W): Takes into account the Activity factor

Channel Type Power Settings Activity Factor Max. Pwr(dBm) Avr. Pwr(dBm) Avr. Pwr (W) % of Tot.P-CPICH 0 100% 33.0 33.0 2.0 10.0%P-SCH -5 10% 31.2 21.2 0.1 0.7%S-SCH -5 10% 29.5 19.5 0.1 0.4%BCH -2 90% 29.9 29.4 0.9 4.4%PICH -7 96% 26.0 25.8 0.4 1.9%PCH -2 20% 32.6 25.6 0.4 1.8%AICH -6 7% 27.0 15.3 0.0 0.2%

FACH-1 1 10% 34.8 24.8 0.3 1.5%FACH-2 1 30% 34.5 29.3 0.8 4.2%

4.2 20.9%Total Power used for Control Channels from a 20W Carrier

Page 98: 1D WCDMA Overview_revised

CONFIDENTIAL

DL Common Control Channel: Power Calculations example Node-B with RRU

Top of Ref PointNode-B at Antenna Max. Pwr(dBm) Avr. Pwr(dBm) Avr. Pwr (W) % of Tot.

Total Available Power Per Sector 20 W 17.8 33.0 33.0 2.0 10.0% P-CPICH43.0 dBm 0.5 42.5 28.0 18.0 0.1 0.3% P-SCH

28.0 18.0 0.1 0.3% S-SCHCPICH Power 33.0 dBm 32.5 31.0 30.5 1.1 5.7% BCH

2.0 W 1.8 26.0 25.8 0.4 1.9% PICH31.0 24.0 0.3 1.3% PCH27.0 15.3 0.0 0.2% AICH34.0 24.0 0.3 1.3% FACH-1

rel dB Activity Factor 34.0 28.8 0.8 3.8% FACH-2 Not UsedP-CPICH 0 100%P-SCH -5 10%S-SCH -5 10% Max. Pwr(dBm) Avr. Pwr(dBm) Avr. Pwr (W) % of Tot.BCH -2 90% 32.5 32.5 1.8 10.0% P-CPICHPICH -7 96% 27.5 17.5 0.1 0.3% P-SCHPCH -2 20% 27.5 17.5 0.1 0.3% S-SCHAICH -6 7% 30.5 30.0 1.0 5.7% BCHFACH-1 1 10% 25.5 25.3 0.3 1.9% PICHFACH-2 1 30% 30.5 23.5 0.2 1.3% PCH

26.5 14.8 0.0 0.2% AICH33.5 23.5 0.2 1.3% FACH-1

Total Power Used For Common Channels 4.2 W 3.7 33.5 28.3 0.7 3.8% FACH-2 Not Used36.2 dBm 35.7

20.9% 20.9%

Power Available For Dedicated Channels 15.8 W 14.142.0 dBm 41.5

79.1% 79.1%

Description of Common Channel Name Description

P-CPICH Primary Common Pilot Channel Predefined pilot sequence (15kbps, SF = 256), used for UE measurements on DLP-SCH Primary Synch Channel 256 Chip code used for initial slot syncronisation, (256 chips out of every 2560 chip slot).S-SCH Secondary Synch Channel Sequence of 256 chip code words, used for frame sync and SC Group ID (256 chips out of every 2560 chip slot).

P-CCPCH Primary Common Control Physical ChannelCarries the BCH information (system & cell specific using MIBs & SIBs) 15ksps, SF=256. Not transmitted during first 256chips of slot.S-CCPCH Secondary Common Control Physical ChannelUsed to carry FACH and PCH (Only on air when information to carry)

PICH Paging Indicator Channel Carries paging indicators. (SF=256).AICH Acquisition Indicator Channel Carries acquisition indicators to respond to RACH pre-ambles. (SF=256). (4096 chips out of 5120 chips)

Common Channel Allocation Relative to CPICH Power

Huawei Top of Node-B

Huawei at Antenna Input

Huawei

Feeder Loss

Page 99: 1D WCDMA Overview_revised

CONFIDENTIAL

DL Common Control Channel: Power Calculations example Node-B with Feeder

Top of Ref PointNode-B at Antenna Max. Pwr(dBm) Avr. Pwr(dBm) Avr. Pwr (W) % of Tot.

Total Available Power Per Sector 20 W 10.0 33.0 33.0 2.0 10.0% P-CPICH43.0 dBm 3.0 40.0 28.0 18.0 0.1 0.3% P-SCH

28.0 18.0 0.1 0.3% S-SCHCPICH Power 33.0 dBm 30.0 31.0 30.5 1.1 5.7% BCH

2.0 W 1.0 26.0 25.8 0.4 1.9% PICH31.0 24.0 0.3 1.3% PCH27.0 15.3 0.0 0.2% AICH34.0 24.0 0.3 1.3% FACH-1

rel dB Activity Factor 34.0 28.8 0.8 3.8% FACH-2 Not UsedP-CPICH 0 100%P-SCH -5 10%S-SCH -5 10% Max. Pwr(dBm) Avr. Pwr(dBm) Avr. Pwr (W) % of Tot.BCH -2 90% 30.0 30.0 1.0 10.0% P-CPICHPICH -7 96% 25.0 15.0 0.0 0.3% P-SCHPCH -2 20% 25.0 15.0 0.0 0.3% S-SCHAICH -6 7% 28.0 27.5 0.6 5.7% BCHFACH-1 1 10% 23.0 22.8 0.2 1.9% PICHFACH-2 1 30% 28.0 21.0 0.1 1.3% PCH

24.0 12.3 0.0 0.2% AICH31.0 21.0 0.1 1.3% FACH-1

Total Power Used For Common Channels 4.2 W 2.1 31.0 25.8 0.4 3.8% FACH-2 Not Used36.2 dBm 33.2

20.9% 20.9%

Power Available For Dedicated Channels 15.8 W 7.942.0 dBm 39.0

79.1% 79.1%

Common Channel Allocation Relative to CPICH Power

Huawei Top of Node-B

Huawei at Antenna Input

Huawei

Feeder Loss

Page 100: 1D WCDMA Overview_revised

CONFIDENTIAL

DL Common Control Channel

• Different quality requirement for the common channels make power planning an important task

Pilot coverage

P-CCPCHcoverage

In this example the mobile "sees" the cell but cannot access it as it cannot decode the BCH

Example values in dBm

CPICH = 33dBmP-CCPCH = 28 dBm (-5)SCH1= SCH2 = P-CCPCH = 28dBm (-5)

Example values in dBm

CPICH = 33dBmP-CCPCH = 28 dBm (-5)SCH1= SCH2 = P-CCPCH = 28dBm (-5)

Page 101: 1D WCDMA Overview_revised

CONFIDENTIAL

UMTS Protocol Overview

Page 102: 1D WCDMA Overview_revised

CONFIDENTIAL

UMTS Signaling Protocol Stack

The Non-Access Stratum architecture evolved from the GSM upper layers and includes:

Connection Management – Handles circuit-switched calls and includes sublayers responsible for call control (e.g., establish, release), supplementary services (e.g., call forwarding, 3-way calling), and short message service (SMS).

Session Management – Handles packet-switched calls (e.g., establish, release).

Mobility Management – Handles location updating and authentication for CS calls.

GPRS Mobility Management – Handles location updating and authentication for PS calls.

The Access Stratum architecture is new for WCDMA, and will see in a bit more detail in the next slides

The UMTS signaling protocol stack is divided into Access Stratum (AS) and Non-Access Stratum (NAS).

Page 103: 1D WCDMA Overview_revised

CONFIDENTIAL

Control Plane Protocol StackThe control plane protocol stack illustrates how signaling protocols are terminated. This example shows a circuit-switched call operating on dedicated Physical Channels.

Access Stratum (AS)• Radio Resource Control (RRC) protocols are defined between UE and RNC to handle establishment, release, and configuration of radio resources.• Radio Link Control (RLC) protocols are defined between UE and RNC to provide segmentation, re-assembly, duplicate detection, and other traditional Layer 2 functions.• Medium Access Control (MAC) protocols are defined between UE and RNC to multiplex user plane and control plane data.• Physical Layer protocols are defined between UE and Node B to transfer data over the radio link. The interface between UE and RNC at the Physical Layer handles macrodiversity combining and splitting functions.

Page 104: 1D WCDMA Overview_revised

CONFIDENTIAL

User Plane Protocol StackThe user plane protocol stack illustrates how user protocols are terminated. This example shows a circuit-switched voice call operating on dedicated Physical Channels.

Non-Access Stratum (NAS)• Application can consist of several layers. For example, in the case of voice, the topmost layer corresponds to the actual acoustic signals heard by users on both ends, whereas a lower layer carries the vocoded bits. In this protocol architecture, vocoders reside at the UE and at the MSC to translate digitized voice between the format transmitted over the air and that sent over digital wirelines (e.g., E1).Access Stratum (AS)• The RLC, MAC, and Physical Layer protocols for user plane are the same as for the control plane.• RRC does not participate in user plane protocols. It is responsible for setting up the radio bearers and channels, but does not touch the data.

Page 105: 1D WCDMA Overview_revised

CONFIDENTIAL

Radio Interface Protocol Architecture (in UE)

Radio Resource Control (RRC)

Packet Data Convergence Protocol (PDCP)

Broadcast/Multicast Control (BMC)

Radio Link Control (RLC)

Medium Access Control (MAC)

Layer 1 or Physical Layer (PHY or L1)

Radio Bearers – Carry signaling between RRC and RLC or carry user data from application layers to Layer 2.

Logical Channels – Carry signaling and user data between RLC and MAC.

Transport Channels – Carry signaling and user data between MAC and PHY.

Physical Channels – Carry signaling and user data over the radio link.

Page 106: 1D WCDMA Overview_revised

CONFIDENTIAL

Access Stratum Layer 3: Radio Resource Control (RRC)

RRC Functions of Access Stratum Layer 3

RRC is the overall controller of the Access Stratum, responsible for configuring all other layers in the Access Stratum and providing the control and signaling interface to the NAS layer.

Radio Resource Control (RRC) Include:

• Broadcast of System Information

• RRC Connection Management

• Radio Bearer Management

• RRC Mobility Functions

• Paging and Notification Functions

• Routing of Higher Layer Messages

• Control of Ciphering and Integrity Protection

• Measurement Control and Reporting

• Power Control Functions

Page 107: 1D WCDMA Overview_revised

CONFIDENTIAL

Access Stratum Layer 2

Layer 2 consists of four sublayers: BMC, PDCP, RLC and MAC.Broadcast/Multicast Control (BMC)

- Involved in the Cell Broadcast Messages

- Storage, scheduling, transmission, delivery

- Request for radio resources

Packet Data Convergence Protocol (PDCP)- Packet data header compression/decompression

Radio Link Control (RLC)- Typical Layer 2 functions

- Segmentation, reassembly, concatenation, padding

- Retransmission control, flow control

- Duplicate detection, in-sequence delivery

- Error correction

- Ciphering

Medium Access Control (MAC)- Mapping and multiplexing Logical Channels to Transport Channels

- Priority handling of data flows

- UE identification on common channels

- Traffic volume measurements

- Random Access Channel procedures

- Ciphering

Page 108: 1D WCDMA Overview_revised

CONFIDENTIAL

Access Stratum Layer 1: Physical Layer

Physical Layer functions are:

Macro-diversity distribution/combining and soft handover

Error detection on Transport Channels

Forward Error Correction (FEC) encoding/decoding

Interleaving/deinterleaving of Transport Channels

Multiplexing/demultiplexing of Transport Channels

Rate matching

Power weighting and combining of Physical Channels

Modulation/demodulation

Spreading/despreading

Frequency and time (chip, bit, slot, frame) synchronization

Measurements (e.g., FER, SIR, interference power, transmit power, etc.)

Closed loop power control

RF processing

Page 109: 1D WCDMA Overview_revised

CONFIDENTIAL

UE Call States

Page 110: 1D WCDMA Overview_revised

CONFIDENTIALUE Call States

Idle Mode

The UE operates in Idle mode whenever it has no active CS or PS call.

UE monitors the PCH and the associated PICH. It may “sleep” between paging cycles, by disabling some of its circuitry to improve standby time.

CELL_DCH State

The CELL_DCH state may be entered from the Idle Mode when an RRC connection is established, or when a Dedicated Physical Channel is established from the CELL_FACH state.

PS call may operate in CELL_DCH state, especially if it is a high data transfer

CELL_FACH State

The CELL_FACH state may be entered from the Idle Mode when an RRC connection is established or from the CELL_DCH state when directed by UTRAN to release dedicated channels

UE continuously monitors the FACH, because UTRAN can send it data or signaling at any time (no sleeping!).

CELL_PCH State

The CELL_PCH state may be entered from the CELL_FACH state, when UTRAN detects a lack of activity from the UE during a PS call.

Similar to Idle Mode, the UE monitors the PCH and the associated PICH. It may sleep between paging cycles. If the UE has data or signaling to send, it autonomously transitions to CELL_FACH and transmits on the RACH. The network knows which cell is camped under and pages that cell only. UE is required to perform a cell update procedure (from CELL_FACH) whenever its location changes to a new cell.

URA_PCH State

The URA_PCH state is similar to the CELL_PCH state, except that it is used when UTRAN detects very low activity from the UE during a PS call and wants to limit the number of cell update procedures performed by the UE.

The UE is required to perform a URA update procedure (from CELL_FACH) whenever its location changes to a new routing area. Because a routing area may encompass many cells, the frequency of updates is much lower than for the CELL_PCH state. The tradeoff is that UTRAN must page the UE in all cells of the routing area, rather than in just a single cell. [URA: UTRAN Registration Area}

Page 111: 1D WCDMA Overview_revised

Thank You

Confidential

Page 112: 1D WCDMA Overview_revised

CONFIDENTIAL

Support Slides

Page 113: 1D WCDMA Overview_revised

CONFIDENTIAL

Downlink channel mapping (Ericsson FDD)

BCCHBroadcast Control Ch.

PCCHPaging Control Ch.

CCCHCommon Control Ch.

DCCHDedicated Control Ch.

DTCHDedicated Traffic Ch. N

BCHBroadcast Ch.

PCHPaging Ch.

FACHForward Access Ch.

DCHDedicated Ch.

P-CCPCH(*)Primary Common Control Physical Ch.

S-CCPCHSecondary Common Control Physical Ch.

DPDCH (one or more per UE) Dedicated Physical Data Ch.

DPCCH (one per UE)Dedicated Physical Control Ch.Pilot, TPC, TFCI bits

SSCi

Logical Channels(Layers 3+)

Transport Channels(Layer 2)

Physical Channels(Layer 1)

DownlinkRF Out

DPCH (Dedicated Physical Channel)One per UE

DSCHDownlink Shared Ch.

SHCCHDSCH Control Ch.

CTCHCommon Traffic Ch.

CPICHCommon Pilot ChannelNull Data

Data Encoding

Data Encoding

Data Encoding

Data Encoding

Data Encoding

PDSCHPhysical Downlink Shared Channel

AICH (Acquisition Indication Channel)

PICH (Paging Indication Channel )

Access Indication data

Paging Indication bits

AP-AICH(Access Preamble Indication Channel )

Access Preamble Indication bits

CSICH (CPCH Status Indication Channel )

CPCH Status Indication bits

CD/CA-ICH (Collision Detection/Channel Assignment )

CPCH Status Indication bits

S/P

S/P

Cch

S/P

S/P

S/P

S/P

S/P

S/P

S/P

S/P

Cell-specificScrambling

Code

I+jQ I/QModulator

Q

I

Cch

Cch

Cch

Cch

Cch

Cch

Cch

Cch 256,1

Cch 256,0

GS

PSC

GP

Sync Codes(*)

* Note regarding P-CCPCH and SCH

Sync Codes are transmitted only in bits 0-255 of each timeslot;P-CCPCH transmits only during the remaining bits of each timeslot

Filter

Filter

Gain

Gain

Gain

Gain

Gain

Gain

Gain

Gain

Gain

Gain

SCH (Sync Channel)

DTCHDedicated Traffic Ch. 1

DCHDedicated Ch.

Data Encoding

MUX

MUX

CCTrCH

DCHDedicated Ch.

Data Encoding

Page 114: 1D WCDMA Overview_revised

CONFIDENTIAL

Uplink channel mapping (Ericsson FDD)

Logical Channels(Layers 3+)

Transport Channels(Layer 2)

Physical Channels(Layer 1)

UplinkRF Out

UEScrambling

Code

I+jQ I/QMod.

Q

I

Chc

I

Filter

Filter

CCCHCommon Control Ch.

DTCH (packet mode)Dedicated Traffic Ch.

RACHRandom Access Ch.

PRACHPhysical Random Access Ch.

DPDCH #1Dedicated Physical Data Ch.

CPCHCommon Packet Ch.

PCPCHPhysical Common Packet Ch.

Data Coding

Data Coding

DPDCH #3 (optional)Dedicated Physical Data Ch.

DPDCH #5 (optional) Dedicated Physical Data Ch.

DPDCH #2 (optional) Dedicated Physical Data Ch.

DPDCH #4 (optional) Dedicated Physical Data Ch.

DPDCH #6 (optional) Dedicated Physical Data Ch.

Q

DPCCHDedicated Physical Control Ch.

Pilot, TPC, TFCI bits

Chd

Gc

Gd

j

Chd,1 Gd

Chd,3 Gd

Chd,5 Gd

Chd,2 Gd

Chd,4 Gd

Chd,6 Gd

Chc Gd

Chc

Chd

Gc

Gd

j

RACH Control Part

PCPCH Control Part

j

DCCHDedicated Control Ch.

DTCHDedicated Traffic Ch. N

DCHDedicated Ch.

Data Encoding

DTCHDedicated Traffic Ch. 1

DCHDedicated Ch.

Data Encoding M

UX

CCTrCH

DCHDedicated Ch.

Data Encoding

Page 115: 1D WCDMA Overview_revised

CONFIDENTIAL

Signaling Diagrams

Page 116: 1D WCDMA Overview_revised

CONFIDENTIAL

Mobile OriginatingCall Setup[CS Services]

Figure shows the procedure for the Mobile Originating Call Setup. The Procedure starts with RRC Connection Request and ends with Connect Ack.

Page 117: 1D WCDMA Overview_revised

CONFIDENTIAL

Mobile TerminatingCall Setup[CS Services]

Figure shows the procedure for the Mobile Terminating Call Setup.

Page 118: 1D WCDMA Overview_revised

CONFIDENTIAL

Terminating SMS

The procedure for mobile terminated SMS is shown

Page 119: 1D WCDMA Overview_revised

CONFIDENTIAL

RAB Establishment (MS initiated) [PS Services]

The UE is in PMM-IDLE mode and sends the Service Request messageincluding RAB Assignment to the SGSN.

Precondition for the scenario is that a Packet Service Attach and aPDP Context Activation have been done.

Page 120: 1D WCDMA Overview_revised

CONFIDENTIAL

Packet Service Attach Including PDP Context Activation

The UE shall perform a GPRS Attach to the SGSN in order to obtain accessto the GPRS services. The Packet Service Attach including PDP ContextActivation procedure

Page 121: 1D WCDMA Overview_revised

CONFIDENTIAL

Contents

WCDMA/UMTS Network Architecture

Core Network Element Overview

UTRAN Network Element Overview

Radio Access Bearer

Introduction to Air-Interface

UMTS-FDD Carriers

Spreading & Processing Gain

DL & UL Channelization Codes

Channel Organization/Mapping in UMTS

DL Common Control Channel Power Settings

Page 122: 1D WCDMA Overview_revised

CONFIDENTIAL

Scrambling Code Planning Overview

Page 123: 1D WCDMA Overview_revised

CONFIDENTIAL

Basic Scrambling Code Theory

The Common Pilot Channel (CPICH) is an unmodulated code channel, which is scrambled with the cell-specific primary scrambling code.

One DL scrambling code is used per sector in the base station, and it makes the signals from different sources separable from each other.

The DL Scrambling code is used in the cell selection, reselection, and handover process by the UE to distinguish the desired cell.

The P-SCH and S-SCH are decoded by the UE attempting to find the P-CPICH.

Once connected into the network P-CCPCH broadcasts neighbour lists, so helping the UE to find suitable handover partners.

UMTS uses 512 primary scrambling codes, divided into 64 groups of 8

Page 124: 1D WCDMA Overview_revised

CONFIDENTIAL

Code Groups

Totally 512 (0…511) DL primary SC are subdivided into 64 (0…63) code

groups each of 8 codes.

Each cell has to be assigned by 1 particular scrambling code.

2 cells for a same sector but with different carriers can have the same SC.

0 0 1 2 3 4 5 6 71 8 9 10 11 12 13 14 152 16 17 18 19 20 21 22 233 24 25 26 27 28 29 30 31. . . . . . . . .. . . . . . . . .. . . . . . . . .. . . . . . . . .. . . . . . . . .

63 504 505 506 507 508 509 510 511

Code Group No.(0,1,….,63)

Total 64 codeGroups

Page 125: 1D WCDMA Overview_revised

CONFIDENTIAL

Cell Search Procedure

1. The UE acquires slot synchronization by correlating the information on the P-SCH with primary synchronization code, which is common to all cells, and by detecting peak values at the matched filter output.

2. The UE obtains frame synchronization and determines the scrambling code group of the cell (made up by eight primary scrambling codes) by correlating the information on the S-SCH with all secondary synchronization code sequences and by detecting the peak value, since the cyclic shifts of sequences are unique.

3. The UE determines the primaryScramblingCode by correlating the CPICH with all codes within the scrambling code group identified in Step2. When the primary scrambling code has been identified, the Primary Common Control Physical Channel (P-CCPCH) will be detected and the UE is able to read the information on the BCCH.

Page 126: 1D WCDMA Overview_revised

CONFIDENTIAL

Code Group Segregation64 Code Groups are divided into 3 sets.

Code Group 0, CG-0, will not be used. Reserved since some vendors cannot use SC0

Set A: 45 groups reserved for Macro layer outdoor sites.Set A will be further subdivided:

- Set A1 for current 2007 rollout , and will support

36 x 8codes = 288 codes = 288 cells = 96 sites (1-time reuse)

- Set A2 reserve for initial 2008 rollout of new sites

9 x 8codes = 72 codes = 72 cells = 24 sites

Set B: 9 groups for future expansions 2008/9, which can support9 x 8codes = 72 codes = 72 cells = 24 sites (1-time reuse)

Set C: 9 groups for In-building, Micro and tested cells which can support

9 x 8codes = 72 codes = 72 cells

1 … 36 37 … 45 46 … 54 55 … 63

Scrambling Code Groups

99936

Set CSet BSet A2Set A1

Page 127: 1D WCDMA Overview_revised

CONFIDENTIAL

Code Group Assignments0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7

Rsv CG-0 0 0 1 2 3 4 5 6 7 CG-37 37 296 297 298 299 300 301 302 303 aCG-1 1 8 9 10 11 12 13 14 15 a CG-38 38 304 305 306 307 308 309 310 311 bCG-2 2 16 17 18 19 20 21 22 23 b CG-39 39 312 313 314 315 316 317 318 319 cCG-3 3 24 25 26 27 28 29 30 31 c CG-40 40 320 321 322 323 324 325 326 327 aCG-4 4 32 33 34 35 36 37 38 39 a CG-41 41 328 329 330 331 332 333 334 335 bCG-5 5 40 41 42 43 44 45 46 47 b CG-42 42 336 337 338 339 340 341 342 343 cCG-6 6 48 49 50 51 52 53 54 55 c CG-43 43 344 345 346 347 348 349 350 351 aCG-7 7 56 57 58 59 60 61 62 63 a CG-44 44 352 353 354 355 356 357 358 359 bCG-8 8 64 65 66 67 68 69 70 71 b CG-45 45 360 361 362 363 364 365 366 367 cCG-9 9 72 73 74 75 76 77 78 79 c CG-46 46 368 369 370 371 372 373 374 375 a

CG-10 10 80 81 82 83 84 85 86 87 a CG-47 47 376 377 378 379 380 381 382 383 bCG-11 11 88 89 90 91 92 93 94 95 b CG-48 48 384 385 386 387 388 389 390 391 cCG-12 12 96 97 98 99 100 101 102 103 c CG-49 49 392 393 394 395 396 397 398 399 aCG-13 13 104 105 106 107 108 109 110 111 a CG-50 50 400 401 402 403 404 405 406 407 bCG-14 14 112 113 114 115 116 117 118 119 b CG-51 51 408 409 410 411 412 413 414 415 cCG-15 15 120 121 122 123 124 125 126 127 c CG-52 52 416 417 418 419 420 421 422 423 aCG-16 16 128 129 130 131 132 133 134 135 a CG-53 53 424 425 426 427 428 429 430 431 bCG-17 17 136 137 138 139 140 141 142 143 b CG-54 54 432 433 434 435 436 437 438 439 cCG-18 18 144 145 146 147 148 149 150 151 c CG-55 55 440 441 442 443 444 445 446 447CG-19 19 152 153 154 155 156 157 158 159 a CG-56 56 448 449 450 451 452 453 454 455CG-20 20 160 161 162 163 164 165 166 167 b CG-57 57 456 457 458 459 460 461 462 463CG-21 21 168 169 170 171 172 173 174 175 c CG-58 58 464 465 466 467 468 469 470 471CG-22 22 176 177 178 179 180 181 182 183 a CG-59 59 472 473 474 475 476 477 478 479CG-23 23 184 185 186 187 188 189 190 191 b CG-60 60 480 481 482 483 484 485 486 487CG-24 24 192 193 194 195 196 197 198 199 c CG-61 61 488 489 490 491 492 493 494 495CG-25 25 200 201 202 203 204 205 206 207 a CG-62 62 496 497 498 499 500 501 502 503CG-26 26 208 209 210 211 212 213 214 215 b CG-63 63 504 505 506 507 508 509 510 511CG-27 27 216 217 218 219 220 221 222 223 cCG-28 28 224 225 226 227 228 229 230 231 aCG-29 29 232 233 234 235 236 237 238 239 bCG-30 30 240 241 242 243 244 245 246 247 cCG-31 31 248 249 250 251 252 253 254 255 aCG-32 32 256 257 258 259 260 261 262 263 bCG-33 33 264 265 266 267 268 269 270 271 cCG-34 34 272 273 274 275 276 277 278 279 aCG-35 35 280 281 282 283 284 285 286 287 bCG-36 36 288 289 290 291 292 293 294 295 c

Cell

Ma

cro

Sit

es

Futu

re E

xpan

sion

In B

uild

ing

/ M

icro

cel

lsM

acro

Site

s

S.C. SetS.C. SetCell

Page 128: 1D WCDMA Overview_revised

CONFIDENTIAL

Outdoor Macro sites SC Plan (Example)

• For the convenience of displaying and mapping the 8 reuse patterns onto the network, 8 individual colors are assigned to each reuse pattern

R1R2R3R4R5R6R7R8

Page 129: 1D WCDMA Overview_revised

CONFIDENTIAL

Scrambling Code Polygon Assignment

ReUse Pattern of 8 Polygons

Repeat same pattern until entire area is planned

Even though a perfect pattern cannot be maintained in the real network try to maintain code group distances to avoid Interference

Page 130: 1D WCDMA Overview_revised

CONFIDENTIAL

KV Scrambling Code Polygon Assignment

Example of KV Re-Use Pattern of the 8 Polygons

Page 131: 1D WCDMA Overview_revised

CONFIDENTIAL

Throughput Calculations: RLC/MAC & LLC Layers

Coding Scheme N (number of bytes) Radio Block Size Radio Block Throughput (bit/s)CS-1 23 23*8=184 184*50=9200CS-2 33 33*8=264 264*50=13200CS-3 39 39*8=312 312*50=15600CS-4 53 53*8=424 424*50=21200

Table 9. Radio Block Throughput (bits/s). Within the RLC/MAC Layer

Number of TS CS-1 CS-2 CS-3 CS-41 9200 13200 15600 212002 9200*2=18400 13200*2=26400 15600*2=31200 21200*2=424003 9200*3=27600 13200*3=39600 15600*3=46800 21200*3=636004 9200*4=36800 13200*4=52800 15600*4=62400 21200*4=84800

Table 10. RLC/MAC Theoretical Maximum Throughput (bits/s)

Number of TS CS-1 CS-2 CS-3 CS-41 8000 12000 14400 200002 8000*2=16000 12000*2=24000 14400*2=28800 20000*2=400003 8000*3=24000 12000*3=36000 14400*3=43200 20000*3=600004 8000*4=32000 12000*4=48000 14400*4=57600 20000*4=80000

Table 11. LLC Theoretical Maximum Throughput (bits/s)

Page 132: 1D WCDMA Overview_revised

CONFIDENTIAL

Slides removed

Page 133: 1D WCDMA Overview_revised

CONFIDENTIAL

Open-Loop (slow) Power Control

Open-loop power control is used for initial power setting of the MS at the beginning of a connection. When the mobile requires access to the network rather than transmit at full power, as is the case in GSM, it uses the following steps to avoid causing interference to other users in the cell:

1. The mobile measures the received power from the Base Station.

2. The mobile read the Base Station transmit power from the broadcast channel.

3. The mobile estimates (calculates) the minimum transmit power necessary to access the Cell and makes an attempt at a power slightly lower.

4. If this attempt is unsuccessful that is, there is no response from the Base Station, it will increase the power and re-try.

Page 134: 1D WCDMA Overview_revised

CONFIDENTIAL

Inner-Loop (fast) Power Control

Power control is also required in call to avoid mobiles transmitting too much power as they move towards the Base Station. The system must ensure that the mobile only transmits just enough to be received to avoid unnecessary interference to other users.

Another reason for this Fast Power Control is to overcome a phenomenon known as fast or Rayleigh fading, whereby the received signal strength from moving objects experiences very short duration fades that are dependant on the radio frequency and the speed of the object.

Once the connection is established, the mobile (uplink) power, can be controlled by the Base Station by sending power control messages (TPC bits, are used for the downlink power control as well). The power can be adjusted in steps of 0.5 dB at a rate of 1500 times per second.

In example below we can see that as Mobile A moves behind the tree it is told to increase its power by 1 dB. Similarly as Mobile B moves towards the Base Station it is told to decrease its power by 1dB.

Page 135: 1D WCDMA Overview_revised

CONFIDENTIAL

Outer-Loop power control

The outer loop power control is needed to keep the quality of communication at the required level by setting the target, SIR target or Eb/I0, for the fast power control.

The SIR target for fast control changes in the range of 1 Hz and is set by the RNC and is based on Bit Error Rate (BER) or Frame Error Rate (FER).

The outer loop aims at providing the required quality: no worse, no better, since too high quality would waste the capacity of the system.

If the received quality in UL is better than the required quality then the SIR target is decreased. If not then the SIR target is increased.

In the DL the fastest adjustment of the downlink target is obtained by having the outer loop power control within the mobile.


Recommended