Sunteți pe pagina 1din 135

Workshop 1

WCDMA Overview
16/09/2008
Confidential

Presented by:

Simeon Kimoliatis
simeonk@digi.com.my
014-6690395

Workshop Contents [WCDMA Overview]


WCDMA/UMTS Network Architecture
Core Network Element Overview
MSC, SGSN, GGSN, Iu Interfaces

UTRAN Network Element and Feature Overview

Day 1

RNC, Node-B

Radio Access Bearer


Introduction to Air-Interface
UMTS-FDD Carriers
Spreading & Processing Gain
Spreading Factor vs. Transmit Power
WCDMA Transmitter
- Coding, Interleaving, Spreading
- DL & UL Channelization Codes
- Scrambling Codes
- Modulation, Rake receiver

UMTS Protocol Overview


Channel Organization/Mapping in UMTS
DL Common Control Channel Power Settings

Day 2

CONFIDENTIAL

CONFIDENTIAL

WCDMA/UMTS System Objectives


Providing broad range of services
voice, video, data with variable rates, and especially multimedia
services.

High quality of service with complete security and


reliability
Easy and smoothly transition from 2G to 3G,
backwards compatibility with 2G
High spectral efficiency
Capable of roaming globally

CONFIDENTIAL

WCDMA/UMTS Applications/Functions

CONFIDENTIAL

WCDMA/UMTS Network Architecture

CONFIDENTIAL

CORE NETWORK ELEMENT OVERVIEW


The CN is responsible for switching and routing calls
and data connections to external networks.
It contains the physical entities that provide support
for the network features and telecommunications
services.
It is also responsible for providing the mobility and
location services on the highest level of the UE.
The CN handles both packet-oriented services (such
as data) and circuit-oriented services (such as
speech).
The UMTS CN can be organised into two main
domains:
CS Domain
PS Domain

CONFIDENTIAL

CORE NETWORK ELEMENT OVERVIEW (II)


CS domain
This domain offers circuit switched bearer services. The cs domain is
mainly used for real time data services, including speech and video
transmission.
The network entities MSC, GMSC and VLR can be found here.
PS domain
This domain offers packet switched bearer services. It is based on the
GSM feature GPRS.
Originally, this domain was developed for non-real time packet switched
applications, such as file transfer, email, access to the Internet. But
there are tendencies to improve its offered QoS, so that real time
services can be offered, too.
The SGSN and GGSN are located in the packet switched domain.
There are also some network elements, which are shared by the
packet switched and circuit switched domain.
The common network elements comprise the HLR, AuC and EIR.
A set of network elements were specified for application provisioning,
which can be also found in the CN.
Examples are the Camel Service Environment and WAP.

CONFIDENTIAL

WCDMA/UMTS Core Network Architecture and Interfaces

CIRCUIT SWTICHED CORE


PSTN/Legacy/
External

MGW
MSC

GMSC

Iu-cs
RNS
TE R MT Uu Node B Iub RNC Iu-cs
Iur

AuC

F
H
MGW

HLR

EIR

Gs

TE R MT Uu Node B Iub RNC Iu-ps

Gf

Gr

Gc

Iu-ps
SGSN

Gn

GGSN

PACKET SWTICHED CORE

Gi

Multimedia IP
Networks

CONFIDENTIAL

MSC SERVER FUNCTIONALITY:


Services
Services Supported by the MSC
Teleservices
- Telephony, Emergency calls, Originating & Terminating, SMS

Bearer Services
- The MSC server supports circuit based data up to 64 kbit/s. It is also possible to
use lower bit rates.

Supplementary Services
- Examples include: Line Identification, Call Forwarding, Call Waiting and Call
Hold, Multi Party, Closed User, Group, Advice of Charge, Call Barring, Call
completion to Busy Subscriber, EMLPP (Enhanced Multi-level Precedence and
Preemption).
Unstructured Supplementary Service Data (USSD), as specified in 3GPP

IN in CAMEL
- Customized Applications for Mobile Network Enhanced Logic.
- The main application of CAMEL is the support of prepaid charging, also referred
to as real-time or on-line charging.

Positioning Service
- This service indicates the position of the mobile. Positioning is based on the
transfer of geographical coordinates stored in the MSC Server that uses the MAP
and CAP protocols. A translation is performed internally between the position of
the cell and the geographical coordinates.

CONFIDENTIAL

MSC SERVER FUNCTIONALITY:


Control Functions
Connection management
The MSC Server handles circuit-based connection management. Iu control
signaling is performed between the MSC Server and UTRAN, while the user
plane is set up via media gateways without passing the MSC Server.
In the event that tones, announcements, connection of transcoders, etc., are
required, the MSC Server orders the devices to be connected.

Mobility management
Roaming: The MSC Server supports mobility management in order to enable
attachment/detachment and roaming within the UMTS network, between UMTS
networks, and between UMTS and GSM networks.
Handover: The MSC Server supports intra-MSC SRNS relocation, inter-MSC
and intra-MSC handover from UMTS to GSM

Security
Subscriber authentication, Key agreement, Ciphering, Data integrity, Negotiation
of algorithm

Charging

MSC SERVER FUNCTIONALITY:


Media Streaming

CONFIDENTIAL

Coding/decoding
The Transcoder Unit will provide coding/decoding between UTRAN and the
UMTS circuit-based Core Network and between UTRAN and the external
network.

Echo cancellation
Echo cancellers are provided to attenuate echo generated at the conversion
between the 4-wire and 2-wire transmissions in the PSTN and acoustic echo
generated in the user equipment.

Tone handling
Devices are provided to send and receive DTMF tones as requested by pushbutton signals originating in the user equipment. Devices are provided for
sending tones such as ringing tones and busy tones, to the mobile subscriber.

Conference Calls
The Conference Call Device (CCD) is provided for bridging multiparty calls.

Announcement machine
Announcement Service Terminals (AST) are provided to make announcements
to end-users.

CONFIDENTIAL

SGSN Server
The SGSN handles the communication with MSs and the
establishment of the connection between an MS and the Packet
Data Network.
It forwards IP packets between all GPRS attached MSs within that
SGSN service area and the GGSN

SGSN Main Functions


Session management
Mobility management
Subscriber data management
Security
GGSN control signaling
Charging
Admission Control
MAP and RANAP control signaling
SMS

CONFIDENTIAL

SGSN SERVER FUNCTIONALITY: Description (1)


Session management:
SGSN functionality for session management is responsible for establishment, maintenance
and release of end user PDP contexts.
This includes inter-working with the GGSNs for IP address allocation if dynamic IP
addresses are used.
Session management also includes functionality for establishment and release of WCDMA
Radio Access Bearers (RAB) for end user IP data transportation.

Mobility management:
Functionality supports intersystem handover within and roaming between mobile networks

Subscriber data management:


SGSN supports the standardized interface to the HLR for management of end user
subscriber data such as International Mobile Subscriber Identity (IMSI), Access Point
Names, Subscribed QoS etc.

Security:
It includes subscriber authentication for attach/detach and location update procedures.

CONFIDENTIAL

SGSN SERVER FUNCTIONALITY: Description (2)


GGSN control signaling:
The GTP-C protocol for control signaling between SGSN and GGSN is supported. GTP-C is
transported by UDP/IP and contains functionality for SGSN - GGSN tunnel management and control.

Charging:
SGSN supports off-line charging with generation of CDRs, and on-line charging according to CAMEL
prepaid is supported.

Admission Control:
function is handling the control of the following:
maximum number of simultaneously attached users in the SGSN
maximum bit-rate in the SGSN
The Admission Control function also includes a control of the MS requested QoS profile against the
subscribed QoS profile.

MAP and RANAP control signaling:


SGSN supports the RANAP protocol for control signaling over the RNC-SGSN interface for
establishment and release of Radio Access Bearers.

SMS:
SGSN treats SMS messages as control traffic, SMS messages can be sent as soon as a control
connection has been established and no dedicated RAB is required

CONFIDENTIAL

SGSN SERVER Interfaces

GGSN Server
GGSN is effectively the gateway to external data networks.
It forwards uplink and downlink IP packets between the SGSN and
the PDN
The GGSN handles session management, that is, activation,
modification, and deactivation of PDP contexts for sessions
between the GGSN and the SGSN, and between the GGSN and
the PDN.
Session management also includes dynamic IP address allocation
and QoS negotiation.
Supports control signaling towards external IP networks for
authentication and IP address allocation,
Supports mobility within the mobile network. It communicates with
one or several SGSNs.
The GGSN provides functions for forwarding and handling user
information (IP packets) to and from external networks
(Internet/intranets).

CONFIDENTIAL

CONFIDENTIAL

GGSN FUNCTIONALITY
The main functions of the GGSN are as follows:
Session and Mobility management
- The GGSN handles establishment, maintenance and release of PDP contexts
that are initiated on request by an SGSN.
- The GGSN includes functionality for intra-PLMN and inter-PLMN routing of IP
packets.

IP address allocation
- The GGSN is responsible for allocation of dynamic IP addresses.
- The GGSN can either allocate the IP addresses itself, or interact with a
RADIUS server for end user authentication and retrieval of IP
addresses.
- Dynamic address allocation enables the use of IP addresses from a
common pool of addresses.

CONFIDENTIAL

Core Interfaces

CONFIDENTIAL

Iuc/ps Function Key Functions


Iucs and Iups provide the control relationships between each of the
RNCs and the CS servers (MSC) and PS servers (SGSN)
For IuCS, an RNC can only be controlled by one MSC.
- One MSC can control several RNCs.

For IuPS, an RNC can only be controlled by one SGSN.


- One SGSN can control several RNCs.

The Iu interface, normally uses two parallel STM-1 links connecting the
RNC to the RNSGW in the Core Network.
The two links are configured as a redundant pair to protect against both
equipment and transmission link faults.
A core network may use the Media Gateway (M-MGw) to perform the role
specified for the RNSGW

CONFIDENTIAL

UTRAN
UMTS Terrestrial Radio Access Network
Overview

CONFIDENTIAL

UTRAN architecture
Hierarchical Architecture
UTRAN Elements:
- Radio Network Controller
- Node B (Base Station)

UTRAN consists of a set of Radio Network Subsystems (RNS)


connected to CN through Iu
Node B connects to RNC through Iub
Iur interface between RNC for soft handover

CONFIDENTIAL

RNC roles
Concerning one connection between UTRAN and one UE, the following
roles of RNC exists:
Serving RNC (SRNC) that control the connections to a UE
Drift RNC (DRNC) that lends its resources for the Serving RNC for a particular UE

Each RNC also has the controlling role towards its Node Bs (CRNC).
One UE connected to UTRAN has one and only one SRNC
One UE may have zero, one or more DRNCs

CONFIDENTIAL

Iur Key Functions


Iur is the Interface connecting 2 RNCs
Supports Inter-RNC Mobility, Soft Handovers
Dedicated channel traffic, (user data transfer with dedicated connection)
-

Allow anchoring of SRNC when UE is in Dedicated channel (DCH) state

Common channel traffic


-

Allow anchoring of SRNC and also when UE is in common channel


(RACH/FACH) state

Flow control between SRNC and DRNC


Transfer of positioning parameters between controller
Transfer of Node B timing information between two RNCs
Huawei also supports RNC relocation.
When UE leaves SHO DRNC becomes
SRNC
It establishes a new Iu interface and the Iur
is terminated.

Iur
Anchoring

CONFIDENTIAL

RNC Key Functions


Responsible for processing of user data
Responsible for Radio Resource Management
Comparable to Base Station Controller in GSM
Key RNC Functions:
Closed loop power control
Handover control
Capacity Management (Admission & Congestion Control)
Code allocation
Packet scheduling
Macro diversity combining/splitting over number of Node Bs

CONFIDENTIAL

Node-B Key Functions


Comparable to Base Transceiver Station in GSM
Responsible for Air Interface Layer 1
Key Node B Functions:
Inner-loop power control
Modulation and spreading
RF Processing
Rate matching
Micro diversity combining/splitting inside Node B

CONFIDENTIAL

RNC & Node-B Feature Overview


Power Ctrl, Handover Ctrl, Capacity Management

Power Control

CONFIDENTIAL

Power control is the most important element in DS-CDMA in particular on the


uplink.
Because many users access and use the same frequency and bandwidth at the
same time, there is a high possibility of interference between the users.
In the case where there is no power control, it may happen that an MS at the
cell edge suffers from a higher path loss than another MS that is close to the
RBS. If there were no mechanism for the MSs to be power controlled to the
same level at the base station, the MS that is closer to the base station could
easily over shout the other MS and block a large part of the cell giving rise to the
so-called near-far problem.
In order to maintain good capacity levels in the network, the signals received by
the RBS, no matter where the MSs are transmitting from (that is near or far)
should be of equal power assuming that all MSs are transmitting at the same
user bit rate.

Three types of power control


1. Open-Loop (slow) power control
2. Inner-Loop (fast) power control and
3. Outer-Loop power control

CONFIDENTIAL

CONFIDENTIAL

Power Control Flow Chart

Uplink Signal to Interference Ratio (SIR)


SIR is defined (according to 3GPP) = (RSCP/ISCP)*SF
Where:

RSCP = Received Signal Code Power


SF = The spreading factor of the DPCCH
ISCP = Interference Signal Code Power
- ISCP is normally approximated by the RTWP (Received Total Wideband
Power)

SIR = (RSCP/RTWP)*SF
Since these terms are normally expressed in dB:
SIR = RSCP RTWP + 10logSF
To solve for RSCP:
RSCP = RTWP + SIR - 10logSF

CONFIDENTIAL

CONFIDENTIAL

Downlink Signal to Interference Ratio (SIR)


In the downlink transmitter the bits are passed though a 1:2 de-mux

SIR = (RSCP/ISCP)*SF/2
Where:

RSCP = Received Signal Code Power


SF = The spreading factor of the DPCCH
ISCP = Interference Signal Code Power
- ISCP is normally approximated by the RTWP (Received Total Wideband Power)

SIR = (RSCP/RTWP)*SF/2
Since these terms are normally expressed in dB:
SIR = RSCP RTWP + 10log(SF/2)
To solve for RSCP:
RSCP = RTWP + SIR - 10log2/SF

Handover Introduction

CONFIDENTIAL

The purpose of handover is to maintain the connection quality


while utilizing as little radio resources as possible while the UE
moves between cells.
In a Wideband Code Division Multiple Access Radio Access
Network (WCDMA RAN) system, there are several types of
handover:
Soft/Softer Handover
- When the UE is in connected mode, CELL_DCH state. It permits
"neighboring" cells to use the same frequency and the UE to have mobility
in order to keep the connection without interruption.
Inter-Frequency Handover:
- When the UE in connected mode, CELL_DCH state, is moving out of
coverage of one WCDMA RAN frequency and into coverage of another
WCDMA RAN frequency. It will cause some interruptions to the connection
(Hard HO)
Inter-Radio Access Technology (Inter-RAT) Handover
- When the UE in connected mode, CELL_DCH state, is moving out from
WCDMA RAN coverage into an area where only GSM/GPRS coverage
exist. It will cause some interruptions to the connection (Hard HO)

CONFIDENTIAL

Handover Introduction
(entities involved during the reporting, evaluation, and execution phases)

Entities Involved in Reporting,


Evaluation, and Execution of
Handover-Related Functions.

SHO_Eval: Soft/Softer Handover


evaluation algorithm.
IFHO_Eval: Inter-Frequency
Handover evaluation algorithm.
IRATHO_Eval: Inter-RAT
Handover (WCDMA RAN to
GSM/GPRS) evaluation algorithm.
SBHO_Eval: Service Based
Handover (WCDMA RAN to GSM
for speech users only) evaluation
algorithm, as a particular case of
IRATHO algorithm.
IRATCC_Eval: Inter-RAT Cell
Change (WCDMA RAN to
GSM/GPRS) evaluation algorithm.
CNHHO_Eval: Hard Handover via
Core Network evaluation
algorithm.
HSCC_Eval: HS-DSCH Cell
Change evaluation algorithm.
Meas_Handl: Measurement
handling algorithm.
UE_Meas_Eval: UE measurement
evaluation algorithm (working in
the UE)..

Soft/Softer Handover Basics (1)

CONFIDENTIAL

In Soft Handover, the UE connection consists of at least two radio links


established with cells belonging to different Radio Base Stations (RBS).
In Softer handover, the UE connection consists of at least two radio
links established with cells belonging to the same RBS.
A combination of Soft and Softer Handover is also possible for a UE
connection
Data flow is not interrupted during the addition or removal of radio links.
The downlink signals, received by the UE, are combined in the RAKE
receiver; that allows for multipath reception and thereby gives protection
against fading

Capacity Management Overview

CONFIDENTIAL

WCDMA RAN Capacity Management solution controls the load in


the WCDMA cell.
This makes it possible for the system to provide the requested QoS
and coverage for individual connections.
Each cell or group of cells has its own set of Capacity Management
functions responsible for monitoring and controlling the resources of
that cell.
The Capacity Management solution consists of three main functions:
Dedicated Monitored Resource Handling
Admission Control
Congestion Control

Capacity Management Overview

CONFIDENTIAL

Capacity Management Functions Overview (1)

CONFIDENTIAL

Dedicated Monitored Resource Handling


The Dedicated Monitored Resource Handling function is responsible for keeping
track of the utilization of critical resources in the system.
The utilization of these resources provides information that is used by Admission and
Congestion Control functions to control the cell load.
- It provides information about the current usage of resources that are critical to the
load of the cell.
This is done by performing measurements and keeping track of every radio link
setup, addition, deletion, and modification in the cell.

CONFIDENTIAL

Capacity Management Functions Overview (2)


Admission Control
The Admission Control function is responsible for controlling the utilization of
dedicated monitored resources by accepting or refusing requests for usage of
these resources.
Those requests are initiated when setting up new connections, performing (soft)
handover, and reconfiguring existing connections.
The decision on accepting or refusing a request takes into account the current
load on the dedicated monitored resources and the characteristics of the request.

Congestion Control
The Congestion Control function is responsible for detecting and resolving
overload situations on certain dedicated monitored resources.
These overload situations can, for example, occur due to fluctuations in the radio
conditions for the individual users.
Overload is resolved by a combination of blocking additional admission requests
in a cell and issuing congestion resolve actions towards individual users
- for example: switching packet users to lower rates, and releasing connections

CONFIDENTIAL

What is the Bearer?


The user traffic, known as the user plane, is carried through the
network from the mobile to the core network on a bearer.
In GSM, the traffic channel was the bearer.
In UMTS, a bearer is a varied bit rate and is allocated depending on
the needs of the subscriber.
The actual data in the bearer is transparent to the network.

CONFIDENTIAL

Bearer Characteristics
DOCUMENTTYPE

Mobile Phones
TypeYourNameHere

1 (1)

TypeDateHere

Conversational class
Voice and video

Streaming class
Streaming video

Interactive class
Web browsing

Background class
Mail downloading

CONFIDENTIAL

Types of bearer
A bearer has different parameters, such as variable data
rates, protection and delay.
The bearer is dependent on the service required.

Voice
Voice Messages

0 8

16

Messaging
Transactional
Infoservices

Audio/Video Streaming
Video telephony

32

48

64

80

96

112

WWW browsing
Intranet access
Downloading

128

256

384

kbit/s

CONFIDENTIAL

Relationship between the RAB and Signaling Protocols


As the bearer is passing through the network elements, we need to control its
activities.
One network element must be capable of sending and receiving messages to
other network elements (Node B to RNC, RNC to CN and RNC to RNC).
This is called signaling.
Standardized signaling protocols specify how two pieces of equipment can
communicate and understand messages.
The figure below illustrates the user plane information between the terminal and
the core network through the network by use of the RAB.

CONFIDENTIAL

UMTS Planes
Transport plane protocols:
Transport plane provides the means how the physical connection
is established between the User Equipment (UE) and the network.
Provides a reliable connection between two end nodes. Is
responsible for the transport of higher layer data
User plane protocols:
Protocols implementing the radio access bearer service carrying
user data through the access stratum (parallel layers).
Control plane protocols:
Protocols for controlling the radio bearers and the connection
between the User Equipment (UE) and the network from different
aspects (including requesting the service, controlling different
transmission resources, handover, and so on).

CONFIDENTIAL

Transport Plane
Iu-PS, Iu-CS, Iur, & Iub:
control data
Iu-CS, Iu-PS, Iur, Iub
user data

user data
Iu-PS

Iu-CS, Iur, Iub

AAL2

AAL5

Service:
Variable bit rate
Source & destination
synchronised
connection orientated

Service:
Variable bit rate
Source & destination
not synchronised
connection orientated

ATM
Physical Layer

RAN
interfaces &
Functions
Summary
Uu Interface:
Transport Plane
- WCDMA (Wideband Code
Division Multiple Access)
Control Plane
- DPDCH and DPCCH Channels
User Plane
- Optimised, application-related
protocols suitable for both
packet and circuit switched
traffic
Procedures
- Radio Link (RL) Setup
- RL Reconfiguration
- RL Addition
- RL Deletion
- Radio Access Bearer Mgmt

Iub Interface:
Transport Plane
- ATM
Control Plane
- Communication Control Ports
- Node B Control Ports
User Plane
- RACH/FACH/DCH Data Ports
forming UE Context(s)
Procedures
- Radio Link (RL) Setup
- RL Reconfiguration
- RL Addition
- RL Deletion
- Power Control Information
- Handover Signalling
- Measurement Reports

BS

BS

BS Functions:
- Modulation
- Rate Matching
- Error Protection in Uu Interface
- Uu Interface Channelisation
- Macro Diversity (Softer Handover)

CONFIDENTIAL

Iur Interface:
Transport Plane
- ATM
Control Plane
- SCCP over CCS7
User Plane
- Frame Protocols for Dedicated
Channels over ATM
Procedures
- Radio Link (RL) Setup
- RL Reconfiguration
- RL Addition
- RL Deletion
- Power Control Information
- Handover Signalling
- Measurement Reports

RNC

RNC

RNC Functions:
Radio Resource Management
- Admission Control
- Code Allocation
- Load Control
- Power Control
- Handover Control (HO)
- Macro Diversity (Soft HO)
Telecommunication Management
- Radio Access Bearer (RAB)
- RAB - Radio Link Mapping

Iu Interface for CN Circuit Domain:


Transport Plane
- ATM
Control Plane
- RANAP over CCS7
User Plane
- Optimised, application-related
protocols over ATM AAL2
Procedures
- Radio Access Bearer Management
- SRNC Relocation
- Direct Transfer Procedures
(Direct Signalling between UE
and the CN Circuit Domain)

Iu Interface for CN Packet Domain:


Transport Plane
- ATM
Control Plane
- RANAP over CCS7 or IP
User Plane
- GTP (GPRS Tunnelling
Protocol) over UDP/IP
over AAL5
Procedures
- Radio Access Bearer Management
- SRNC Relocation
- Direct Transfer Procedures
(Direct Signalling between UE
and the CN Packet Domain)

CONFIDENTIAL

UTRAN Overview
Introduction to Air-Interface

CONFIDENTIAL

UTRAN Interfaces

UTRAN Definitions
RNS (Radio Network
Subsystem)
A full or partial network offering
access between UE and Core
Network
Contains one RNC

RNC (Radio Network


Controller)
Element of the RNS that
controls physical radio
resources

Node B
Logical Node controlling
transmission and reception from
one or more cells

Iub Interface
Interface between RNC and
Node B

Uu Interface
Interface between UE and Node
B

Iur Interface
Interface between one RNS and
another RNS

Iu Interface
Interface between CN and RNS

CONFIDENTIAL

WCDMA Direct Sequence CDMA (DS-CDMA)


WCDMA/UMTS uses Direct Sequence CDMA (DS-CDMA), the
information for each user is spread with a unique code.
Separate Users through different Codes
Provides large bandwidth
Provides continuous transmission and reception

CDMA is also known as a Spread Spectrum Technology.

CONFIDENTIAL

UMTS-FDD Carriers

Others Operator Carriers

DiGi Carriers

Ch. Number (UARFCN UL/DL = Carrier Center Freq * 5 = 2112.4*5 =10562

WCDMA terminology Bits, Symbols, & Chips


Terms: Bit, Symbol, Chip
Bit : data after source coding
Symbol: data after channel coding and interleaving
Chip: data after spreading

Processing Procedure of WCDMA System

CONFIDENTIAL

CONFIDENTIAL

SPREADING WITH CODES


The process of spreading
A bit of information is a 1 or a 0 (digital) or a -1, +1 (analogue).
The user information bits are spread into a number of chips when it is
multiplied with the spreading code (which is unique).
- The chip rate for the system is constant 3.84 Mchip/s
- and the signal is spread into a bandwidth of 5 MHz.

The Spreading Factor (SF) is the ratio between the chip rate and the
symbol rate.
- This is equal to the spreading gain (i.e. the protection against interference).

The same code is used to dispread the information after it is sent over the
air interface, i.e. both the UE and the RBS use the same codes.

Different bit rates and Spreading Factors at a constant chip rate

CONFIDENTIAL

Power density (Watts/Hz)

Spreading Factor & Processing Gain


Bit rate

Unspread narrowband signal

Spread wideband signal

Frequency

Bandwidth W (3.84 Mchip/sec)

R SF const W 3.84 Mchip


G p dB

BU u
BBaerer

SF
R

sec
Gp:
BUu:
BBearer:
rate
SF:

processing gain
system chip rate
bearer symbol
spreading factor

CONFIDENTIAL

Processing Gain Examples


Voice user (R=12,2 kbit/s)

Power density
(W/Hz)

Gp=W/R=24.98
dB
=10log10 (3.84^6/12.2^3)

Frequency (Hz)

Packet data user (R=384 kbit/s)

Power density
(W/Hz)

Gp=W/R=10
dB

Spreading
sequences have
a different length
Processing gain
depends on the
user data rate

CONFIDENTIAL

Transmission Power
To send a stream of bits, a certain power is needed.
The bit rate has a constant relationship to the power level and if
the bit rate is high, then the power level becomes high and vice
versa

Power
Frequency

5MHz

High bit rate user

Low bit rate user


Time

CONFIDENTIAL

Spreading Factor vs. Power

Since the chip rate is constant, the spreading factor is low when the
bit rate is high.
One of the most important characteristics of WCDMA is the fact that
power is the common shared resource.

Imagine like a box with fix volume

When SF Increases Power


decreases

When SF decreases Power increases

CONFIDENTIAL

Eb/No and Processing Gain


Eb/N0 (the energy per bit to noise power spectral density
ratio) is an important parameter in digital communication or data
transmission
In 3G radio network planning and system dimensioning typically
make use of the terms Eb/No and Processing Gain (PG).
defines the required and achieved carrier to interference (C/I) ratio i.e. C/I = Eb/No - PG.

Both Eb/No and PG are relatively conceptual and are not


quantities that can be measured directly.
Eb/No is provided by the equipment vendors for the Uplink and
Downlink, for the different CS and PS services and for the
different channel model types (i.e. TU3, TU50, RA50 etc)
Table below are the Eb/No values used by Huawei

Processing Gain and Eb/No Example

CONFIDENTIAL

Processing gain is what gives CDMA systems the robustness against selfinterference that is necessary in order to reuse the available 5 MHz carrier
frequencies over geographically close distances.
Lets take an example with real WCDMA parameters.
Speech service with a bit rate of 12.2 kbps has a processing gain of 25 dB, 10log10
(3.84e6/12.2e3).
After dispreading, the signal power needs to be typically a few decibels above the
interference and noise power.
The required power density over the interference power density after dispreading is
designated as Eb/No, where Eb is the energy, or power density, per user bit and No is
the interference and noise power density.
For speech service Eb/No is typically in the order of 7.0 dB, and the required wideband
signal-to-interference ratio is therefore 7.0 dB minus the processing gain is 18.0 dB.
In other words, the signal power can be 18 dB under the interference or thermal noise
power, and the WCDMA receiver can still detect the signal.

CONFIDENTIAL

WCDMA Transmitter
Pre-coded
data (bits)

Symbols

Chips

Orthogon
al Code 1
Data
Channel
1

CRC
CRC
Coding
Coding
Add CRC
to
Transport
Block

FEC
FEC
Coding
Coding

InterInterleaving
leaving

D/A
D/A

Channel Coding:
Convolutional
or Turbo
Starts here

Linear
Linear
Summatio
Summatio
n
n

Orthogon
al Code N
Data
Channel
N

Allows for
error
detection in
the receiver

CRC
CRC
Coding
Coding

FEC
FEC
Coding
Coding

Allows for
error
correction
in the
receiver

InterInterleaving
leaving

Improves
error
correction
in the
receiver

Gives a
unique
identity to
each data
stream

Spread Spectrum
Code
(PN Code or Gold
SSC_I Code)SSC_Q

Complex
Complex
Multiplie
Multiplie
r
r
(I + jQ)
(I + jQ) Q

Pulse
Pulse
Shaping
Shaping
Filter
Filter
Pulse
Pulse
Shaping
Shaping
Filter
Filter

I/Q
I/Q
Modulato
Modulato
r
r

RF
Out

D/A
D/A

Maps
digital bits
to analog
signals
0 +1
1 -1

CRC: Cyclic Redundancy Check


FEC: Forward Error Correction

1:2
1:2
Demu
Demu
x
x

Provides
2x higher
data rate
(WCDMA,
cdma2000
downlink)

Gives a unique
identity to this
transmitter

Contains
transmitte
d
frequency
spectrum

Allows both
signals from 1:2
Demux to share
the same RF
bandwidth

Air interface: Coding, Interleaving, Spreading


The number of chips per data symbol is called the Spreading Factor (SF).
The lower the spreading factor the higher the data rate.
SF value varies in FDD from 4 to 512.

CONFIDENTIAL

WCDMA Channel Coding

CONFIDENTIAL

During the transmission, there are many interferences and fading.


To guarantee reliable transmission, system should overcome these
through the channel coding which includes convolution and
interleaving.
Convolution that is used for overcome interference.
Through the technology, many redundant bits will be inserted in original
information.
When error code is caused by interference, the redundant bits can be
used to recover the original information.

3 types of Channel Coding are possible [per code block of N bits]


1/2 rate convolutional channel coding [2N + 16 bits], coded information
1/3 rate convolutional channel coding [3N + 24 bits]
turbo coding [3N + 12 bits]

Convolution code applies to voice service while Turbo code applies


to high rate data service.
Channel Coding Increases the delay

Interleaving
Interleaving spreads out consecutive bits in time
Reduces the probability of losing consecutive bits
Convolutional encoding is sensitive to consecutive bit loss

Trades delay time for data protection


Longer interleaving periods have better data protection with more
delay

Interleaving periods:10, 20, 40, or 80 ms


Most coding schemes perform better on random data errors
than on blocks of errors.
By interleaving the data, no two adjacent bits are transmitted
near to each other, and the data errors are randomized.

CONFIDENTIAL

CONFIDENTIAL

Spreading Codes in WCDMA


In WCDMA, two types of codes are used in tandem for spreading the
channel bits into a wideband CDMA chip sequence:
channelization codes, and
scrambling codes.

the channelization code


performs the actual signal
spreading to the final chip
rate (3.84 Mchips/s)

after spreading the


scrambling code only
modifies the chip values in
the transmitted chip sequence
in such a way that the crosscorrelation interference in the
system is minimised.

DL & UL Channelization Codes

CONFIDENTIAL

Channelization codes, or Walsh Codes, are often referred to as Orthogonal Variable


Spreading Factor (OSVF)
SF for the DL transmission in FDD mode = {4, 8, 16, 32, 64, 128, 256, 512}
SF for the UL transmission in FDD mode = {4, 8, 16, 32, 64, 128, 256}
- A lower SF means a higher data rate, because this means less chips per symbol
- PS384 kbps (DL) SF=8 => 8 chips per symbol
- AMR12.2 kbps (DL) SF=128 => 128 chips per symbol

The codes have orthogonal properties to minimize the interference between different users.
Two vectors that are orthogonal give the resulting vector 0, when they are multiplied with
each other.
This means that the coded information is only affected by the right orthogonal code when it is dispread.
In this way the interference can be minimized.
The channelization codes preserve the orthogonality between the different physical channels of users even if they
operate at different bit rates

Orthogonal codes are suited for channel separation, where synchronisation between
different channels can be guaranteed, e.g.
downlink channels under one cell,
uplink channels from a single user;
- uplink signals from different users are not time synchronised.

CONFIDENTIAL

Channelization codes
Channelization codes are very
important in downlink, since they
are used for multiplexing (at the
transmitter) and separating (at the
receiver) the signals intended for
different terminals.
In uplink, channelization codes are
used for multiplexing the data and
control channel (DPDCH and
DPCCH) signals transmitted from a
single terminal.
In both directions, the
channelization codes are employed
for spreading the channel bits to the
final chip rate of 3.84 Mchips/s.

The required bit rate - and thus the


spreading factor - of some services
may change over time. The
transmitter takes care of changes
in the spreading factor among
others by changing the
channelization code.
The channelization codes are
based on the Orthogonal Variable
Spreading Factor (OVSF)
technique, which allows the
spreading factor to be changed
without disrupting the orthogonality
between different codes of different
lengths simultaneously in use.

CONFIDENTIAL

Channelization Code Tree


SF=
1

SF=
2

SF=
4

SF=
8

C16(0)=[......
......]
C16(1)=[......
C4(0)=[111
......]
C16(2)=[......
1]
C8(1)=[1111-1-1-1- ......]
C16(3)=[......
1]
......]
C16(4)=[......
C8(2)=[11-1-111- ......]
C16(5)=[......
1-1]
C4(1)=[11-1......]
C16(6)=[......
1]
C8(3)=[11-1-1-1-111]
......]
C16(7)=[......
......]
C16(8)=[......
C8(0)=[1-11-11......]
C16(9)=[......
11-1]
C4(2)=[1......]
C16(10)=[......
11-1]
C8(5)=[1-11-1-11-11]
.....]
C16(11)=[........
...]
C16(12)=[....
C8(6)=[1-1-111-1- .......]
C16(13=[......
11]
C4(3)=[1-1.....]
C16(14)=[....
11]
C8(7)=[1-1-11-111- .......]
C16(15)=[....
1]
.......]
C8(0)=[111111
11]

C2(0)=[11]

C0(0)=[
1]

C2(1)=[11]

SF=1
6

...

SF=25
6

CONFIDENTIAL

Tree of Orthogonal Channelization Codes in Downlink


The codes have
orthogonal
properties to
minimize the
interference
between different
users.
Channelization
codes of different
length,
depending of the
bit rate
Ensures
orthogonality
even with
different rates
and spreading
factors

Channelization Code Tree

384 user #2

384 user #1
Signaling

SF
4
SF
8
SF
16

128 user #1

CONFIDENTIAL

DL Primary Scrambling Code


The data stream after the channelization
codes, multiplied by a code from a group of
special binary codes, to distinguish
between different transmitters.
UMTS uses 512 primary scrambling codes,
divided into 64 groups of 8
The Common Pilot Channel (CPICH) is an
unmodulated code channel, which is
scrambled with the cell-specific primary
scrambling code.
One DL scrambling code is used per sector
in the base station, and it makes the signals
from different sources separable from each
other.
The DL Scrambling code is used in the cell
selection, reselection, and handover
process by the UE to distinguish the
desired cell.

CONFIDENTIAL

KV Scrambling Code Group Plan

15 Sites per Group

CONFIDENTIAL

Where are codes used?


Dedicated User
Channel
In the Uplink

In the Uplink

(UE Node B),


the user's data and
signaling information is
separated by

Channelization
Codes

signaling
data
In the Downlink

(UE Node B),


terminals are
separated by
Scrambling Codes

In the Downlink

(Node B UE),

(Node BUE),

user connections are


separated by Channelization
Codes

cells are separated by

Scrambling Codes

CONFIDENTIAL

Channelization and Scrambling Code Summary

Usage

Channelization code

Scrambling code

Uplink: Separation of
physical data and control
channels from the same
terminal

Uplink: Separation of
terminals

Downlink: Separation of
downlink dedicated user
channels

Downlink: Separation
of sectors (cell)

Length

Variable (depends on the


user allocation)

Fixed

Number of
codes

Depends on the spreading


factor (SF)

Uplink: Several
million
Downlink: 512

CONFIDENTIAL

Air interface - Modulation

RF communication systems use advanced forms of modulation to increase the


amount of data that can be transmitted in a given amount of frequency spectrum
Q

QPSK uses four phases


They are positioned on
a circle so that they can
all be transmitted with
the same energy
This gives maximum
phase-separation
between adjacent points
and thus the best
immunity to corruption
Can encode two bits per
symbol to minimize the
BER

10

00
I

11

01

101
1

100
1

000
1

001
1

101
0

100
0

000
0

001
0

111
0

110
0

010
0

011
0

111
1

110
1

010
1

011
1

QPSK

16QAM

2 bits / symbol =
480 kbit/s/HS-PDSCH =
max. 7.2 Mbit/s

4 bits / symbol =
960 kbit/s/HS-PDSCH =
max. 14.4 Mbit/s

The higher order modulations need a much better SNR because when an error occurs on
one symbol, more bits are lost.
Example: EDGE (Enhanced Data rates for GSM Evolution) uses an 8-PSK modulation scheme. It can provide data
rates up to 380 kbps, but only for users close to the base station (in a 100 m radius approximately),

In UMTS, a spread spectrum modulation is used. It is made of two stages:


Symbol modulation based on spread spectrum symbols. Each symbol is modulated by several chips,
Chip modulation based on a simple narrow band modulation. This is a classical PSK modulation.

Rake Receiver

CONFIDENTIAL

CDMA uses the multipath signals and combines them to make an even stronger
signal at the receivers due to its wide bandwidth and Rake receivers
It is essentially a set of four or more receivers
One of the receivers (fingers) constantly searches for different multipath and
helps the other 3 fingers to lock into strong multipath signals which have more
than one chip delay
Each finger then demodulates the signal corresponding to a strong multipath
and then the results are combined together to make a stronger signal

CONFIDENTIAL

Micro/Macro Diversity Combining


Node B
RAKE
Receive
r

MS
RAKE
Receive
r

Summed signal

Micro Diversity Points


max ratio combining is used

Active cell set

Node B

Macro Diversity Point


selection combining is used

Node B

Node B

S-RNC
D-RNC

Core Network

CONFIDENTIAL

UMTS Channel Mapping

CONFIDENTIAL

UMTS Channel Terminology


Downlink Transmitted by UTRAN, received by UE.
Uplink Transmitted by UE, received by UTRAN.
Common Carries information to/from multiple UEs.
Dedicated Carries information to/from a single UE.
Logical Defined by what type of information is transferred, e.g.,
signaling or user data.
Transport Defined by how data is transferred over the air
interface, e.g., multiplexing of Logical Channels.
Physical Defined by physical mappings and attributes used to
transfer data over the air interface, e.g., spreading rate.

Radio Interface Protocol Architecture (in UE)

Radio Resource Control (RRC)


Packet Data Convergence Protocol (PDCP)
Broadcast/Multicast Control (BMC)
Radio Link Control (RLC)
Medium Access Control (MAC)
Layer 1 or Physical Layer (PHY or L1)

Radio Bearers Carry signaling between


RRC and RLC or carry user data from
application layers to Layer 2.
Logical Channels Carry signaling and user
data between RLC and MAC.
Transport Channels Carry signaling and
user data between MAC and PHY.
Physical Channels Carry signaling and
user data over the radio link.

CONFIDENTIAL

CONFIDENTIAL

UMTS Channel Organization


In UMTS there are three different types of channels

UE
Node B

RNC

Logical channels

Transport channels
Physical
channels

Frames

Radio Interface Channel


Description

CONFIDENTIAL

: Logical Channels
Logical Channels were created to transmit a specific content.
There are for instance logical channel to transmit the cell system information,
paging information, or user data.
Logical channels are offered as data transfer service by the Medium Access
Control (MAC) layer to the next higher layer.
Consequently, logical channels are in use between the mobile phone and the
RNC.
Transport Channels (TrCH)
The MAC layer is using the transport service of the lower, Physical layer.
The MAC layer is responsible to organise the logical channel data on transport
channels. This process is called mapping. In this context, the MAC layer is also
responsible to determine the used transport format.
The transport of logical channel data takes place between the UE and the RNC.
Physical Channels (PhyCH)
The physical layer offers the transport of data to the higher layer.
The characteristics of the physical transport have to be described.
When we transmit information between the RNC and the UE, the physical
medium is changing.
Between the RNC and the Node B, where we talk about the interface Iub, the
transport of information is physically organised in so-called Frames.
Between the Node B and the UE, where we find the WCDMA radio interface Uu,
the physical transmission is described by physical channels.
A physical channel is defined by the UARFCN and the a spreading code in the FDD

CONFIDENTIAL

Downlink channel mapping


BCCH

BCH

SCH-1/SCH-2
(created in
NodeB)

CCPCH-1

PCCH CCCH

PCH

CTCH

FACH

CCPCH-2

DCCH DTCH

DCH

DSCH

PDSCH
DPCH
(DPDCH+DPCCH)

Logical Channels

Transport Channels

Physical Channels

Logical Channels:

Transport Channels:

Physical Chs:

Control Channels (CCH):

Common Transport Channels:

characterised by

Broadcast Control Channel


(BCCH)
Paging Control Channel
(PCCH)
Common Control Channel
(CCCH)
Dedicated Control Channel
(DCCH)

Traffic Channels (TCH):


Dedicated Traffic Channel
(DTCH)

Broadcast Channel (BCH)


Paging Channel (PCH)
Forward Access Channel (FACH)
Downlink Shared Channel (DSCH)
Random Access Channel (RACH)
Common Packet Channel (CPCH)

Dedicated Transport Channels:


Dedicated Channel (DCH)

UARFCN,
scrambling code,
channelization
code (optional),
start and stop
time, and
relative phase

CONFIDENTIAL

Uplink channel mapping


CCCH

DTCH

RACH

PRACH

L o g ic a l C h a n n e ls

DCCH

DCH

DPDCH

DPCCH

CPCH

T r a n s p o r t C h a n n e ls

PCPCH

P h y s ic a l C h a n n e ls

Logical Channels:

Transport Channels:

Physical Chs:

Control Channels (CCH):

Common Transport Channels:

characterised by

Common Control Channel


(CCCH)
Dedicated Control Channel
(DCCH)

Traffic Channels (TCH):


Dedicated Traffic Channel
(DTCH)

Random Access Channel (RACH)


Common Packet Channel (CPCH)

Dedicated Transport Channels:


Dedicated Channel (DCH)

UARFCN,
scrambling code,
channelization
code (optional),
start and stop
time, and
relative phase

CONFIDENTIAL

Broadcast Channel
Broadcast Channel (Downlink)
Broadcast Control Channel (BCCH) [Logical/L3]
Broadcast Channel (BCH) [Transport/L2]
Primary Common Control Physical Channel (PCCPCH) [L1]
First channel to be decoded by UE after acquisition
Carries system information such as system ID, cell ID,
neighbor cell information, system frame number, etc.
The BCCH Logical Channel carries system information
messages necessary for the UE to camp on a WCDMA cell
and to access the system.
UTRAN broadcasts this channel continuously, repeating the
system information messages at a system configurable
repetition rate.
The UE typically reads this channel after power-up or when
camping on a new cell and periodically thereafter to ensure that
the UE has current system information.

CONFIDENTIAL

Paging Channel
Paging Channel (Downlink)
Paging Control Channel (PCCH)
Paging Channel (PCH)
Secondary Common Control Physical Channel
(SCCPCH)
Page Indicator Channel (PICH)
Monitored by UE in Idle Mode, CELL_PCH, and
URA_PCH
Carries Paging messages
The PCCH Logical Channel carries paging messages to
notify the UE of incoming calls. It is used in conjunction
with the physical Page Indicator Channel (PICH).
UTRAN broadcasts the PCH continuously, but the UE
typically only monitors the PICH during assigned slots

CONFIDENTIAL

Random and Forward Access Channels


Random Access Channel (Uplink)
Common Control Channel (CCCH) [Logical/L3]
Random Access Channel (RACH) [Transport/L2]
Physical Random Access Channel (PRACH)
Transmitted by UE to access the system
Forward Access Channel (Downlink)
Common Control Channel (CCCH)
Forward Access Channel (FACH)
Secondary Common Control Physical Channel (SCCPCH)
Acquisition Indication Channel (AICH)
Carries UTRAN messages to UE in Idle mode
These Uplink and Downlink Channels are used by the UE and
UTRAN to communicate when the UE does not have a Dedicated
Channel allocated to it.
The RACH has an access protocol associated with it, in which the UE
transmits a preamble at increasing power levels until the UTRAN
responds on the AICH.
When UTRAN receives a message from the UE on RACH, it responds on
FACH. The FACH Transport Channel is mapped to an SCCPCH.

CONFIDENTIAL

Dedicated Channels
Dedicated Channels (Uplink/Downlink)
Dedicated Control Channel (DCCH) [Logical/L3]
Dedicated Traffic Channel (DTCH) [Logical/L3]
Dedicated Channel (DCH) [Transport/L2]
Dedicated Physical Data Channel (DPDCH)
Dedicated Physical Control Channel
(DPCCH)
Carries signaling and user data

These Uplink and Downlink Channels are


used to carry signaling and user data between
the UTRAN and an individual UE.
These channels are assigned when a voice
call is active or when a packet data call is
transferring data.

CONFIDENTIAL

Frame Structure and Timing


Frame Timing
Transmission Time Interval (TTI)
- TTI: 10, 20, 40, 80 ms boundaries
10 ms radio frames, 15 slots per frame
38400 chips per frame
Super Frame = 72 Frames = 720ms

Slot Timing
2560 chips per slot, 0.67 ms

At the 3.84 x 10^6 chipping rate =>


38,400 chips per 10 ms Frame =>
2560 chips per slot.

Symbol Timing
Symbol consists of a number of chips
OVSF determines chips/symbol
OVSF ranges from 4 to 512 chips/symbol
(640 to 5 symbols per slot)
- AMR12.2kbps: SF=128 => 128 chips/symbol => 640/128=5 symbols/slot
- PS384kbps: SF=8 => 8 chips/symbol => 640/8=5=80 symbols/slot

CONFIDENTIAL

Uplink Frame Structure for DPDCH and DPCCH


Each frame of length 10 ms is split into 15 slots,
Each of length Tslot = 0.667 ms, corresponding to one
power-control period.
A super frame corresponds to 72 consecutive frames,
i.e. the super-frame length is 720 ms.

The control information


consists of:
pilot bits to support
channel estimation for
coherent detection
transmit power-control
(TPC) commands,
feedback information
(FBI)
optional transport format
combination indicator
(TFCI)

UL DPCH is two Physical Channels: the DPDCH and the DPCCH.


UL Dedicated Physical Data Channel (DPDCH) sent on I branch.
UL Dedicated Physical Control Channel (DPCCH) sent on Q
branch.

CONFIDENTIAL

Downlink Frame Structure for DPDCH and DPCCH


The control information
consists of:
pilot bits to support
channel estimation for
coherent detection
transmit power-control
(TPC) commands,
feedback information
(FBI)
optional transport format
combination indicator
(TFCI)

There is only one type of downlink dedicated physical channel, the Downlink
Dedicated Physical Channel (downlink DPCH).
Within one downlink DPCH, i.e. the dedicated transport channel (DCH), is
transmitted in time-multiplex with control information (known pilot bits, TPC
commands, and an optional TFCI).
The downlink DPCH can thus be seen as a time multiplex of a downlink
DPDCH and a downlink DPCCH.

CONFIDENTIAL

System Information Messages

CONFIDENTIAL

System Information Messages


The BCCH (Logical Ch) is mapped to the BCH (TrCh).
The Node-B continuously transmits the SIBs in system information messages
on the BCH

A UE is always able to find the MIB on the BCCH and to get the
scheduling information for the other SIBs
The SIBs contain all information necessary for UEs to work
properly in both Idle and Connected mode
UE timers and counters, Cell selection and reselection parameters, Common
Physical Channel parameters, Measurement parameters, Neighbor list
parameters

System Information Structure

CONFIDENTIAL

The System Information elements are broadcast in System Information


Blocks (SIBs).
SIB groups together System Information elements related to the same
kind of activity controls.
Different types of SIB exist, and each type contains a specific collection of
information.
The SIBs are organized as a tree, as shown below.
A MIB gives reference to a number of SIBs, and its functions include
scheduling information for those SIBs.

NEMO
BCH, MIB, SIB (1)

CONFIDENTIAL

NEMO
BCH, MIB, SIB (2)

CONFIDENTIAL

Cell Selection and Reselection


Parameters

{[-173 (thermal noise density)] (-58)}


= -115 (qRxLevMin)

NEMO
BCH, MIB, SIB (3)

CONFIDENTIAL

NEMO
BCH, MIB, SIB (4)
Cell & Common Channel Configuration

CONFIDENTIAL

CONFIDENTIAL

DL Common Control Channel Power Settings

CONFIDENTIAL

DL Common Control Channel Power Settings


Power Settings for the different downlink common channels that are
controlled through cell setup and cell reconfiguration.
These include Primary Common Pilot Channel (PCPICH),
Synchronization Channel (SCH)
Primary Common Control Physical Channel (PCCPCH),

DL Common control channels must be heard over the whole


cell, thus their power setting is designed for cell edge.
DL Common Channels does not have a power control
The power of the common physical channels are set relative to the
CPICH:

Power Settings: Actual settings in OSS (Huawei Recommended)


Avr.Pwr (dBm/W): Takes into account the Activity factor

DL Common Control Channel:


Power Calculations example Node-B with RRU

CONFIDENTIAL

DL Common Control Channel:


Power Calculations example Node-B with Feeder

CONFIDENTIAL

CONFIDENTIAL

DL Common Control Channel


Different quality requirement for the common
channels make power planning an important task

Example values in dBm

P-CCPCH
coverage

Pilot
coverag
e

CPICH
= 33dBm
P-CCPCH = 28 dBm (-5)
SCH1= SCH2 = P-CCPCH = 28dBm (-5)

In this example the mobile


"sees" the cell but cannot
access it as it cannot decode
the BCH

CONFIDENTIAL

UMTS Protocol Overview

UMTS Signaling Protocol Stack

CONFIDENTIAL

The UMTS signaling protocol stack is divided into Access Stratum (AS) and NonAccess Stratum (NAS).

The Non-Access Stratum architecture evolved from the GSM upper


layers and includes:
Connection Management Handles circuit-switched calls and includes sublayers responsible
for call control (e.g., establish, release), supplementary services (e.g., call forwarding, 3-way
calling), and short message service (SMS).
Session Management Handles packet-switched calls (e.g., establish, release).
Mobility Management Handles location updating and authentication for CS calls.
GPRS Mobility Management Handles location updating and authentication for PS calls.

The Access Stratum architecture is new for WCDMA, and will see in a
bit more detail in the next slides

Control Plane Protocol Stack

CONFIDENTIAL

The control plane protocol stack illustrates how signaling protocols are
terminated. This example shows a circuit-switched call operating on
dedicated Physical Channels.

Access Stratum (AS)


Radio Resource Control (RRC) protocols are defined between UE and RNC to
handle establishment, release, and configuration of radio resources.
Radio Link Control (RLC) protocols are defined between UE and RNC to provide
segmentation, re-assembly, duplicate detection, and other traditional Layer 2 functions.
Medium Access Control (MAC) protocols are defined between UE and RNC to
multiplex user plane and control plane data.
Physical Layer protocols are defined between UE and Node B to transfer data over
the radio link. The interface between UE and RNC at the Physical Layer handles
macrodiversity combining and splitting functions.

User Plane Protocol Stack

CONFIDENTIAL

The user plane protocol stack illustrates how user protocols are
terminated. This example shows a circuit-switched voice call operating on
dedicated Physical Channels.

Non-Access Stratum (NAS)


Application can consist of several layers. For example, in the case of voice, the
topmost layer corresponds to the actual acoustic signals heard by users on both ends,
whereas a lower layer carries the vocoded bits. In this protocol architecture, vocoders
reside at the UE and at the MSC to translate digitized voice between the format
transmitted over the air and that sent over digital wirelines (e.g., E1).

Access Stratum (AS)


The RLC, MAC, and Physical Layer protocols for user plane are the same as for
the control plane.
RRC does not participate in user plane protocols. It is responsible for setting up the
radio bearers and channels, but does not touch the data.

Radio Interface Protocol Architecture (in UE)

Radio Resource Control (RRC)


Packet Data Convergence Protocol (PDCP)
Broadcast/Multicast Control (BMC)
Radio Link Control (RLC)
Medium Access Control (MAC)
Layer 1 or Physical Layer (PHY or L1)

Radio Bearers Carry signaling between


RRC and RLC or carry user data from
application layers to Layer 2.
Logical Channels Carry signaling and user
data between RLC and MAC.
Transport Channels Carry signaling and
user data between MAC and PHY.
Physical Channels Carry signaling and
user data over the radio link.

CONFIDENTIAL

Access Stratum Layer 3:


Radio Resource Control (RRC)

CONFIDENTIAL

RRC Functions of Access Stratum Layer 3


RRC is the overall controller of the Access Stratum, responsible for
configuring all other layers in the Access Stratum and providing the control
and signaling interface to the NAS layer.
Radio Resource Control (RRC) Include:
Broadcast of System Information

RRC Connection Management


Radio Bearer Management
RRC Mobility Functions
Paging and Notification Functions
Routing of Higher Layer Messages
Control of Ciphering and Integrity Protection
Measurement Control and Reporting
Power Control Functions

Access Stratum Layer 2


Layer 2 consists of four sublayers: BMC, PDCP, RLC and MAC.
Broadcast/Multicast Control (BMC)
- Involved in the Cell Broadcast Messages
- Storage, scheduling, transmission, delivery
- Request for radio resources

Packet Data Convergence Protocol (PDCP)


- Packet data header compression/decompression

Radio Link Control (RLC)


- Typical Layer 2 functions
- Segmentation, reassembly, concatenation, padding
- Retransmission control, flow control
- Duplicate detection, in-sequence delivery
- Error correction
- Ciphering

Medium Access Control (MAC)


-

Mapping and multiplexing Logical Channels to Transport Channels


Priority handling of data flows
UE identification on common channels
Traffic volume measurements
Random Access Channel procedures
Ciphering

CONFIDENTIAL

Access Stratum Layer 1: Physical Layer


Physical Layer functions are:
Macro-diversity distribution/combining and soft handover
Error detection on Transport Channels
Forward Error Correction (FEC) encoding/decoding
Interleaving/deinterleaving of Transport Channels
Multiplexing/demultiplexing of Transport Channels
Rate matching
Power weighting and combining of Physical Channels
Modulation/demodulation
Spreading/despreading
Frequency and time (chip, bit, slot, frame) synchronization
Measurements (e.g., FER, SIR, interference power, transmit power, etc.)
Closed loop power control
RF processing

CONFIDENTIAL

CONFIDENTIAL

UE Call States

UE Call States

CONFIDENTIAL

Idle Mode
The UE operates in Idle mode whenever it has no active CS or PS call.
UE monitors the PCH and the associated PICH. It may sleep between paging cycles, by disabling some of its circuitry
to improve standby time.
CELL_DCH State
The CELL_DCH state may be entered from the Idle Mode when an RRC connection is established, or when a Dedicated
Physical Channel is established from the CELL_FACH state.
PS call may operate in CELL_DCH state, especially if it is a high data transfer
CELL_FACH State
The CELL_FACH state may be entered from the Idle Mode when an RRC connection is established or from the
CELL_DCH state when directed by UTRAN to release dedicated channels
UE continuously monitors the FACH, because UTRAN can send it data or signaling at any time (no sleeping!).
CELL_PCH State
The CELL_PCH state may be entered from the CELL_FACH state, when UTRAN detects a lack of activity from the UE
during a PS call.
Similar to Idle Mode, the UE monitors the PCH and the associated PICH. It may sleep between paging cycles. If the UE
has data or signaling to send, it autonomously transitions to CELL_FACH and transmits on the RACH. The network
knows which cell is camped under and pages that cell only. UE is required to perform a cell update procedure (from
CELL_FACH) whenever its location changes to a new cell.
URA_PCH State
The URA_PCH state is similar to the CELL_PCH state, except that it is used when UTRAN detects very low activity from
the UE during a PS call and wants to limit the number of cell update procedures performed by the UE.
The UE is required to perform a URA update procedure (from CELL_FACH) whenever its location changes to a new
routing area. Because a routing area may encompass many cells, the frequency of updates is much lower than for the
CELL_PCH state. The tradeoff is that UTRAN must page the UE in all cells of the routing area, rather than in just a single
cell. [URA: UTRAN Registration Area}

Thank You

Confidential

CONFIDENTIAL

Support Slides

CONFIDENTIAL

Downlink channel mapping (Ericsson FDD)


Logical Channels
(Layers 3+)

Transport Channels
(Layer 2)

Physical Channels
(Layer 1)

Null Data
BCCH
Broadcast Control Ch.

BCH
Broadcast Ch.

Data
Encoding

PCCH
Paging Control Ch.

PCH
Paging Ch.

Data
Encoding

CCCH
Common Control Ch.
CTCH
Common Traffic Ch.

Cch 256,0

P-CCPCH(*)
S/P
Primary Common Control Physical Ch.
Cch 256,1

FACH
Data
Forward Access Ch. Encoding

Sync Codes(*)

Gain

PSC
Gain

GP

SSCi
Cch

SCH (Sync Channel)

GS

Gain

DPCH (Dedicated Physical Channel)


CCTrCH One per UE

DCH
Data
Dedicated Ch. Encoding

DTCH
Dedicated Traffic Ch. 1

DCH
Data
Dedicated Ch. Encoding

M
U
X

Cell-specific
Scrambling
Code
DPDCH (one or more per UE)
Dedicated Physical Data Ch.

M
U
X

S/P
Cch

DCH
Data
Dedicated Ch. Encoding
Pilot, TPC, TFCI bits

SHCCH
DSCH Control Ch.

S/P

S-CCPCH
S/P
Secondary Common Control Physical Ch.

DCCH
Dedicated Control Ch.

DTCH
Dedicated Traffic Ch. N

CPICH
Common Pilot Channel

DSCH
Data
Downlink Shared Ch.Encoding
Access Indication data
Paging Indication bits
Access Preamble Indication bits

Gain

I+jQ

Downlink
RF Out

I
Q

Filter
Filter

I/Q
Modulator

DPCCH (one per UE)


Dedicated Physical Control Ch.
PDSCH
Physical Downlink Shared Channel

S/P

AICH
(Acquisition Indication Channel)

S/P

PICH
(Paging Indication Channel )

S/P

AP-AICH
S/P
(Access Preamble Indication Channel )

CPCH Status Indication bits

CSICH
(CPCH Status Indication Channel )

CPCH Status Indication bits

CD/CA-ICH
S/P
(Collision Detection/Channel Assignment )

S/P

* Note regarding P-CCPCH and SCH


Cch

Gain

Cch

Gain

Cch

Gain

Cch

Gain

Cch

Gain

Cch

Gain

Sync Codes are transmitted only in bits 0-255 of each timeslot;


P-CCPCH transmits only during the remaining bits of each timeslot

CONFIDENTIAL

Uplink channel mapping (Ericsson FDD)


Logical Channels
(Layers 3+)

Transport Channels
(Layer 2)

CCCH
Common Control Ch.

RACH
Random Access Ch.

Physical Channels
(Layer 1)

Data
Coding

Chd

Gd

PRACH
Physical Random Access Ch.

RACH Control Part

DTCH (packet mode)


Dedicated Traffic Ch.

CPCH
Common Packet Ch.

Data
Coding

Chc

Gc

Chd

Gd

PCPCH
Physical Common Packet Ch.

UE
Scrambling
Code

Uplink
RF Out

PCPCH Control Part

Chc

CCTrCH
DCCH
Dedicated Control Ch.

DCH
Data
Dedicated Ch. Encoding

DTCH
Dedicated Traffic Ch. 1

DCH
Data
Dedicated Ch. Encoding

DTCH
Dedicated Traffic Ch. N

DPDCH #1
Dedicated Physical Data Ch.
DPDCH #3 (optional)
Dedicated Physical Data Ch.

M
U
X

DCH
Data
Dedicated Ch. Encoding

DPDCH #5 (optional)
Dedicated Physical Data Ch.
DPDCH #2 (optional)
Dedicated Physical Data Ch.
DPDCH #4 (optional)
Dedicated Physical Data Ch.
DPDCH #6 (optional)
Dedicated Physical Data Ch.

Pilot, TPC, TFCI bits

Chd,1

Gd

Chd,3

Gd

Chd,5

Gd

Chd,2

Gd

Chd,4

Gd

Chd,6

Gd

Chc

Gd

DPCCH
Dedicated Physical Control Ch.

Gc

Q
j

I+jQ

I
Q

Filter
Filter

I/Q
Mod.

CONFIDENTIAL

Signaling Diagrams

CONFIDENTIAL

Mobile Originating
Call Setup
[CS Services]

Figure shows
the procedure
for the Mobile
Originating Call
Setup.
The Procedure
starts with RRC
Connection
Request and
ends with
Connect Ack.

CONFIDENTIAL

Mobile Terminating
Call Setup
[CS Services]

Figure shows
the procedure
for the Mobile
Terminating
Call Setup.

CONFIDENTIAL

Terminating SMS

The procedure
for mobile
terminated
SMS is shown

CONFIDENTIAL

RAB Establishment
(MS initiated) [PS
Services]

The UE is in PMMIDLE mode and


sends the Service
Request message
including RAB
Assignment to the
SGSN.
Precondition for the
scenario is that a
Packet Service
Attach and a
PDP Context
Activation have
been done.

CONFIDENTIAL

Packet Service Attach


Including PDP Context
Activation

The UE shall
perform a GPRS
Attach to the SGSN
in order to obtain
access
to the GPRS
services. The
Packet Service
Attach including
PDP Context
Activation
procedure

Contents
WCDMA/UMTS Network Architecture
Core Network Element Overview
UTRAN Network Element Overview
Radio Access Bearer
Introduction to Air-Interface
UMTS-FDD Carriers
Spreading & Processing Gain
DL & UL Channelization Codes
Channel Organization/Mapping in UMTS
DL Common Control Channel Power Settings

CONFIDENTIAL

CONFIDENTIAL

Scrambling Code Planning Overview

Basic Scrambling Code Theory

CONFIDENTIAL

The Common Pilot Channel (CPICH) is an unmodulated code


channel, which is scrambled with the cell-specific primary
scrambling code.
One DL scrambling code is used per sector in the base station,
and it makes the signals from different sources separable from
each other.
The DL Scrambling code is used in the cell selection, reselection,
and handover process by the UE to distinguish the desired cell.
The P-SCH and S-SCH are decoded by the UE attempting to find
the P-CPICH.
Once connected into the network P-CCPCH broadcasts neighbour
lists, so helping the UE to find suitable handover partners.
UMTS uses 512 primary scrambling codes, divided into 64 groups
of 8

CONFIDENTIAL

Code Groups

Totally 512 (0511) DL primary SC are subdivided into 64 (063) code


groups each of 8 codes.
Each cell has to be assigned by 1 particular scrambling code.
2 cells for a same sector but with different carriers can have the same
SC.

Code Group No.


(0,1,.,63)
Total 64 code
Groups

0
1
2
3
.
.
.
.
.
63

0
8
16
24
.
.
.
.
.
504

1
9
17
25
.
.
.
.
.
505

2
10
18
26
.
.
.
.
.
506

3
11
19
27
.
.
.
.
.
507

4
12
20
28
.
.
.
.
.
508

5
13
21
29
.
.
.
.
.
509

6
14
22
30
.
.
.
.
.
510

7
15
23
31
.
.
.
.
.
511

CONFIDENTIAL

Cell Search Procedure


1. The UE acquires slot synchronization by
correlating the information on the P-SCH with
primary synchronization code, which is common
to all cells, and by detecting peak values at the
matched filter output.
2. The UE obtains frame synchronization and
determines the scrambling code group of the
cell (made up by eight primary scrambling
codes) by correlating the information on the SSCH with all secondary synchronization code
sequences and by detecting the peak value,
since the cyclic shifts of sequences are unique.
3. The UE determines the primaryScramblingCode
by correlating the CPICH with all codes within
the scrambling code group identified in Step2.
When the primary scrambling code has been
identified, the Primary Common Control
Physical Channel (P-CCPCH) will be detected
and the UE is able to read the information on
the BCCH.

CONFIDENTIAL

Code Group Segregation


64 Code Groups are divided into 3 sets.
Code Group 0, CG-0, will not be used. Reserved since some vendors cannot use SC0

Set A: 45 groups reserved for Macro layer outdoor sites.


Set A will be further subdivided:
- Set A1 for current 2007 rollout , and will support
36 x 8codes = 288 codes = 288 cells = 96 sites (1-time reuse)
- Set A2 reserve for initial 2008 rollout of new sites
9 x 8codes = 72 codes = 72 cells = 24 sites

Set B: 9 groups for future expansions 2008/9, which can support


9 x 8codes = 72 codes = 72 cells = 24 sites (1-time reuse)

Set C: 9 groups for In-building, Micro and tested cells which can
support
9 x 8codes = 72 codes = 72 cells

Code Group Assignments

CONFIDENTIAL

CONFIDENTIAL

Outdoor Macro sites SC Plan (Example)


For the convenience of displaying

and mapping the 8 reuse patterns onto


the network, 8 individual colors are
assigned to each reuse pattern

R1
R2
R3
R4
R5
R6
R7
R8

CONFIDENTIAL

Scrambling Code Polygon Assignment


ReUse Pattern of 8
Polygons
Repeat same pattern
until entire area is
planned
Even though a perfect
pattern cannot be
maintained in the real
network try to maintain
code group distances to
avoid Interference

CONFIDENTIAL

KV Scrambling Code Polygon Assignment

Example of
KV Re-Use
Pattern of
the 8
Polygons

CONFIDENTIAL

Throughput Calculations: RLC/MAC & LLC Layers

Coding Scheme
CS-1
CS-2
CS-3
CS-4

N (number of bytes)
23
33
39
53

Radio Block Size


23*8=184
33*8=264
39*8=312
53*8=424

Radio Block Throughput (bit/s)


184*50=9200
264*50=13200
312*50=15600
424*50=21200

Table 9. Radio Block Throughput (bits/s). Within the RLC/MAC Layer

Number of TS
CS-1
1
9200
2
9200*2=18400
3
9200*3=27600
4
9200*4=36800

CS-2
CS-3
13200
15600
13200*2=26400 15600*2=31200
13200*3=39600 15600*3=46800
13200*4=52800 15600*4=62400

CS-4
21200
21200*2=42400
21200*3=63600
21200*4=84800

Table 10. RLC/MAC Theoretical Maximum Throughput (bits/s)

Number of TS
CS-1
CS-2
CS-3
CS-4
1
8000
12000
14400
20000
2
8000*2=16000 12000*2=24000 14400*2=28800 20000*2=40000
3
8000*3=24000 12000*3=36000 14400*3=43200 20000*3=60000
4
8000*4=32000 12000*4=48000 14400*4=57600 20000*4=80000
Table 11. LLC Theoretical Maximum Throughput (bits/s)

CONFIDENTIAL

Slides removed

CONFIDENTIAL

Open-Loop (slow) Power Control


Open-loop power control is used for initial power setting of the
MS at the beginning of a connection. When the mobile
requires access to the network rather than transmit at full
power, as is the case in GSM, it uses the following steps to
avoid causing interference to other users in the cell:
1. The mobile measures the received power from the Base Station.
2. The mobile read the Base Station transmit power from the broadcast
channel.
3. The mobile estimates (calculates) the minimum transmit power necessary
to access the Cell and makes an attempt at a power slightly lower.
4. If this attempt is unsuccessful that is, there is no response from the Base
Station, it will increase the power and re-try.

CONFIDENTIAL

Inner-Loop (fast) Power Control


Power control is also required in call to avoid mobiles transmitting too much
power as they move towards the Base Station. The system must ensure that
the mobile only transmits just enough to be received to avoid unnecessary
interference to other users.
Another reason for this Fast Power Control is to overcome a phenomenon
known as fast or Rayleigh fading, whereby the received signal strength from
moving objects experiences very short duration fades that are dependant on
the radio frequency and the speed of the object.
Once the connection is established, the mobile (uplink) power, can be
controlled by the Base Station by sending power control messages (TPC bits,
are used for the downlink power control as well). The power can be adjusted in
steps of 0.5 dB at a rate of 1500 times per second.
In example below we can see that as Mobile A moves behind the tree it is told
to increase its power by 1 dB. Similarly as Mobile B moves towards the Base
Station it is told to decrease its power by 1dB.

Outer-Loop power control


The outer loop power control is needed to keep the quality of
communication at the required level by setting the target, SIR
target or Eb/I0, for the fast power control.
The SIR target for fast control changes in the range of 1 Hz
and is set by the RNC and is based on Bit Error Rate (BER) or
Frame Error Rate (FER).
The outer loop aims at providing the required quality: no worse,
no better, since too high quality would waste the capacity of the
system.
If the received quality in UL is better than the required quality
then the SIR target is decreased. If not then the SIR target is
increased.
In the DL the fastest adjustment of the downlink target is
obtained by having the outer loop power control within the
mobile.

CONFIDENTIAL

S-ar putea să vă placă și