Documente Academic
Documente Profesional
Documente Cultură
WCDMA Overview
16/09/2008
Confidential
Presented by:
Simeon Kimoliatis
simeonk@digi.com.my
014-6690395
Day 1
RNC, Node-B
Day 2
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
WCDMA/UMTS Applications/Functions
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
MGW
MSC
GMSC
Iu-cs
RNS
TE R MT Uu Node B Iub RNC Iu-cs
Iur
AuC
F
H
MGW
HLR
EIR
Gs
Gf
Gr
Gc
Iu-ps
SGSN
Gn
GGSN
Gi
Multimedia IP
Networks
CONFIDENTIAL
Bearer Services
- The MSC server supports circuit based data up to 64 kbit/s. It is also possible to
use lower bit rates.
Supplementary Services
- Examples include: Line Identification, Call Forwarding, Call Waiting and Call
Hold, Multi Party, Closed User, Group, Advice of Charge, Call Barring, Call
completion to Busy Subscriber, EMLPP (Enhanced Multi-level Precedence and
Preemption).
Unstructured Supplementary Service Data (USSD), as specified in 3GPP
IN in CAMEL
- Customized Applications for Mobile Network Enhanced Logic.
- The main application of CAMEL is the support of prepaid charging, also referred
to as real-time or on-line charging.
Positioning Service
- This service indicates the position of the mobile. Positioning is based on the
transfer of geographical coordinates stored in the MSC Server that uses the MAP
and CAP protocols. A translation is performed internally between the position of
the cell and the geographical coordinates.
CONFIDENTIAL
Mobility management
Roaming: The MSC Server supports mobility management in order to enable
attachment/detachment and roaming within the UMTS network, between UMTS
networks, and between UMTS and GSM networks.
Handover: The MSC Server supports intra-MSC SRNS relocation, inter-MSC
and intra-MSC handover from UMTS to GSM
Security
Subscriber authentication, Key agreement, Ciphering, Data integrity, Negotiation
of algorithm
Charging
CONFIDENTIAL
Coding/decoding
The Transcoder Unit will provide coding/decoding between UTRAN and the
UMTS circuit-based Core Network and between UTRAN and the external
network.
Echo cancellation
Echo cancellers are provided to attenuate echo generated at the conversion
between the 4-wire and 2-wire transmissions in the PSTN and acoustic echo
generated in the user equipment.
Tone handling
Devices are provided to send and receive DTMF tones as requested by pushbutton signals originating in the user equipment. Devices are provided for
sending tones such as ringing tones and busy tones, to the mobile subscriber.
Conference Calls
The Conference Call Device (CCD) is provided for bridging multiparty calls.
Announcement machine
Announcement Service Terminals (AST) are provided to make announcements
to end-users.
CONFIDENTIAL
SGSN Server
The SGSN handles the communication with MSs and the
establishment of the connection between an MS and the Packet
Data Network.
It forwards IP packets between all GPRS attached MSs within that
SGSN service area and the GGSN
CONFIDENTIAL
Mobility management:
Functionality supports intersystem handover within and roaming between mobile networks
Security:
It includes subscriber authentication for attach/detach and location update procedures.
CONFIDENTIAL
Charging:
SGSN supports off-line charging with generation of CDRs, and on-line charging according to CAMEL
prepaid is supported.
Admission Control:
function is handling the control of the following:
maximum number of simultaneously attached users in the SGSN
maximum bit-rate in the SGSN
The Admission Control function also includes a control of the MS requested QoS profile against the
subscribed QoS profile.
SMS:
SGSN treats SMS messages as control traffic, SMS messages can be sent as soon as a control
connection has been established and no dedicated RAB is required
CONFIDENTIAL
GGSN Server
GGSN is effectively the gateway to external data networks.
It forwards uplink and downlink IP packets between the SGSN and
the PDN
The GGSN handles session management, that is, activation,
modification, and deactivation of PDP contexts for sessions
between the GGSN and the SGSN, and between the GGSN and
the PDN.
Session management also includes dynamic IP address allocation
and QoS negotiation.
Supports control signaling towards external IP networks for
authentication and IP address allocation,
Supports mobility within the mobile network. It communicates with
one or several SGSNs.
The GGSN provides functions for forwarding and handling user
information (IP packets) to and from external networks
(Internet/intranets).
CONFIDENTIAL
CONFIDENTIAL
GGSN FUNCTIONALITY
The main functions of the GGSN are as follows:
Session and Mobility management
- The GGSN handles establishment, maintenance and release of PDP contexts
that are initiated on request by an SGSN.
- The GGSN includes functionality for intra-PLMN and inter-PLMN routing of IP
packets.
IP address allocation
- The GGSN is responsible for allocation of dynamic IP addresses.
- The GGSN can either allocate the IP addresses itself, or interact with a
RADIUS server for end user authentication and retrieval of IP
addresses.
- Dynamic address allocation enables the use of IP addresses from a
common pool of addresses.
CONFIDENTIAL
Core Interfaces
CONFIDENTIAL
The Iu interface, normally uses two parallel STM-1 links connecting the
RNC to the RNSGW in the Core Network.
The two links are configured as a redundant pair to protect against both
equipment and transmission link faults.
A core network may use the Media Gateway (M-MGw) to perform the role
specified for the RNSGW
CONFIDENTIAL
UTRAN
UMTS Terrestrial Radio Access Network
Overview
CONFIDENTIAL
UTRAN architecture
Hierarchical Architecture
UTRAN Elements:
- Radio Network Controller
- Node B (Base Station)
CONFIDENTIAL
RNC roles
Concerning one connection between UTRAN and one UE, the following
roles of RNC exists:
Serving RNC (SRNC) that control the connections to a UE
Drift RNC (DRNC) that lends its resources for the Serving RNC for a particular UE
Each RNC also has the controlling role towards its Node Bs (CRNC).
One UE connected to UTRAN has one and only one SRNC
One UE may have zero, one or more DRNCs
CONFIDENTIAL
Iur
Anchoring
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
Power Control
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
SIR = (RSCP/RTWP)*SF
Since these terms are normally expressed in dB:
SIR = RSCP RTWP + 10logSF
To solve for RSCP:
RSCP = RTWP + SIR - 10logSF
CONFIDENTIAL
CONFIDENTIAL
SIR = (RSCP/ISCP)*SF/2
Where:
SIR = (RSCP/RTWP)*SF/2
Since these terms are normally expressed in dB:
SIR = RSCP RTWP + 10log(SF/2)
To solve for RSCP:
RSCP = RTWP + SIR - 10log2/SF
Handover Introduction
CONFIDENTIAL
CONFIDENTIAL
Handover Introduction
(entities involved during the reporting, evaluation, and execution phases)
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
Congestion Control
The Congestion Control function is responsible for detecting and resolving
overload situations on certain dedicated monitored resources.
These overload situations can, for example, occur due to fluctuations in the radio
conditions for the individual users.
Overload is resolved by a combination of blocking additional admission requests
in a cell and issuing congestion resolve actions towards individual users
- for example: switching packet users to lower rates, and releasing connections
CONFIDENTIAL
CONFIDENTIAL
Bearer Characteristics
DOCUMENTTYPE
Mobile Phones
TypeYourNameHere
1 (1)
TypeDateHere
Conversational class
Voice and video
Streaming class
Streaming video
Interactive class
Web browsing
Background class
Mail downloading
CONFIDENTIAL
Types of bearer
A bearer has different parameters, such as variable data
rates, protection and delay.
The bearer is dependent on the service required.
Voice
Voice Messages
0 8
16
Messaging
Transactional
Infoservices
Audio/Video Streaming
Video telephony
32
48
64
80
96
112
WWW browsing
Intranet access
Downloading
128
256
384
kbit/s
CONFIDENTIAL
CONFIDENTIAL
UMTS Planes
Transport plane protocols:
Transport plane provides the means how the physical connection
is established between the User Equipment (UE) and the network.
Provides a reliable connection between two end nodes. Is
responsible for the transport of higher layer data
User plane protocols:
Protocols implementing the radio access bearer service carrying
user data through the access stratum (parallel layers).
Control plane protocols:
Protocols for controlling the radio bearers and the connection
between the User Equipment (UE) and the network from different
aspects (including requesting the service, controlling different
transmission resources, handover, and so on).
CONFIDENTIAL
Transport Plane
Iu-PS, Iu-CS, Iur, & Iub:
control data
Iu-CS, Iu-PS, Iur, Iub
user data
user data
Iu-PS
AAL2
AAL5
Service:
Variable bit rate
Source & destination
synchronised
connection orientated
Service:
Variable bit rate
Source & destination
not synchronised
connection orientated
ATM
Physical Layer
RAN
interfaces &
Functions
Summary
Uu Interface:
Transport Plane
- WCDMA (Wideband Code
Division Multiple Access)
Control Plane
- DPDCH and DPCCH Channels
User Plane
- Optimised, application-related
protocols suitable for both
packet and circuit switched
traffic
Procedures
- Radio Link (RL) Setup
- RL Reconfiguration
- RL Addition
- RL Deletion
- Radio Access Bearer Mgmt
Iub Interface:
Transport Plane
- ATM
Control Plane
- Communication Control Ports
- Node B Control Ports
User Plane
- RACH/FACH/DCH Data Ports
forming UE Context(s)
Procedures
- Radio Link (RL) Setup
- RL Reconfiguration
- RL Addition
- RL Deletion
- Power Control Information
- Handover Signalling
- Measurement Reports
BS
BS
BS Functions:
- Modulation
- Rate Matching
- Error Protection in Uu Interface
- Uu Interface Channelisation
- Macro Diversity (Softer Handover)
CONFIDENTIAL
Iur Interface:
Transport Plane
- ATM
Control Plane
- SCCP over CCS7
User Plane
- Frame Protocols for Dedicated
Channels over ATM
Procedures
- Radio Link (RL) Setup
- RL Reconfiguration
- RL Addition
- RL Deletion
- Power Control Information
- Handover Signalling
- Measurement Reports
RNC
RNC
RNC Functions:
Radio Resource Management
- Admission Control
- Code Allocation
- Load Control
- Power Control
- Handover Control (HO)
- Macro Diversity (Soft HO)
Telecommunication Management
- Radio Access Bearer (RAB)
- RAB - Radio Link Mapping
CONFIDENTIAL
UTRAN Overview
Introduction to Air-Interface
CONFIDENTIAL
UTRAN Interfaces
UTRAN Definitions
RNS (Radio Network
Subsystem)
A full or partial network offering
access between UE and Core
Network
Contains one RNC
Node B
Logical Node controlling
transmission and reception from
one or more cells
Iub Interface
Interface between RNC and
Node B
Uu Interface
Interface between UE and Node
B
Iur Interface
Interface between one RNS and
another RNS
Iu Interface
Interface between CN and RNS
CONFIDENTIAL
CONFIDENTIAL
UMTS-FDD Carriers
DiGi Carriers
CONFIDENTIAL
CONFIDENTIAL
The Spreading Factor (SF) is the ratio between the chip rate and the
symbol rate.
- This is equal to the spreading gain (i.e. the protection against interference).
The same code is used to dispread the information after it is sent over the
air interface, i.e. both the UE and the RBS use the same codes.
CONFIDENTIAL
Frequency
BU u
BBaerer
SF
R
sec
Gp:
BUu:
BBearer:
rate
SF:
processing gain
system chip rate
bearer symbol
spreading factor
CONFIDENTIAL
Power density
(W/Hz)
Gp=W/R=24.98
dB
=10log10 (3.84^6/12.2^3)
Frequency (Hz)
Power density
(W/Hz)
Gp=W/R=10
dB
Spreading
sequences have
a different length
Processing gain
depends on the
user data rate
CONFIDENTIAL
Transmission Power
To send a stream of bits, a certain power is needed.
The bit rate has a constant relationship to the power level and if
the bit rate is high, then the power level becomes high and vice
versa
Power
Frequency
5MHz
CONFIDENTIAL
Since the chip rate is constant, the spreading factor is low when the
bit rate is high.
One of the most important characteristics of WCDMA is the fact that
power is the common shared resource.
CONFIDENTIAL
CONFIDENTIAL
Processing gain is what gives CDMA systems the robustness against selfinterference that is necessary in order to reuse the available 5 MHz carrier
frequencies over geographically close distances.
Lets take an example with real WCDMA parameters.
Speech service with a bit rate of 12.2 kbps has a processing gain of 25 dB, 10log10
(3.84e6/12.2e3).
After dispreading, the signal power needs to be typically a few decibels above the
interference and noise power.
The required power density over the interference power density after dispreading is
designated as Eb/No, where Eb is the energy, or power density, per user bit and No is
the interference and noise power density.
For speech service Eb/No is typically in the order of 7.0 dB, and the required wideband
signal-to-interference ratio is therefore 7.0 dB minus the processing gain is 18.0 dB.
In other words, the signal power can be 18 dB under the interference or thermal noise
power, and the WCDMA receiver can still detect the signal.
CONFIDENTIAL
WCDMA Transmitter
Pre-coded
data (bits)
Symbols
Chips
Orthogon
al Code 1
Data
Channel
1
CRC
CRC
Coding
Coding
Add CRC
to
Transport
Block
FEC
FEC
Coding
Coding
InterInterleaving
leaving
D/A
D/A
Channel Coding:
Convolutional
or Turbo
Starts here
Linear
Linear
Summatio
Summatio
n
n
Orthogon
al Code N
Data
Channel
N
Allows for
error
detection in
the receiver
CRC
CRC
Coding
Coding
FEC
FEC
Coding
Coding
Allows for
error
correction
in the
receiver
InterInterleaving
leaving
Improves
error
correction
in the
receiver
Gives a
unique
identity to
each data
stream
Spread Spectrum
Code
(PN Code or Gold
SSC_I Code)SSC_Q
Complex
Complex
Multiplie
Multiplie
r
r
(I + jQ)
(I + jQ) Q
Pulse
Pulse
Shaping
Shaping
Filter
Filter
Pulse
Pulse
Shaping
Shaping
Filter
Filter
I/Q
I/Q
Modulato
Modulato
r
r
RF
Out
D/A
D/A
Maps
digital bits
to analog
signals
0 +1
1 -1
1:2
1:2
Demu
Demu
x
x
Provides
2x higher
data rate
(WCDMA,
cdma2000
downlink)
Gives a unique
identity to this
transmitter
Contains
transmitte
d
frequency
spectrum
Allows both
signals from 1:2
Demux to share
the same RF
bandwidth
CONFIDENTIAL
CONFIDENTIAL
Interleaving
Interleaving spreads out consecutive bits in time
Reduces the probability of losing consecutive bits
Convolutional encoding is sensitive to consecutive bit loss
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
The codes have orthogonal properties to minimize the interference between different users.
Two vectors that are orthogonal give the resulting vector 0, when they are multiplied with
each other.
This means that the coded information is only affected by the right orthogonal code when it is dispread.
In this way the interference can be minimized.
The channelization codes preserve the orthogonality between the different physical channels of users even if they
operate at different bit rates
Orthogonal codes are suited for channel separation, where synchronisation between
different channels can be guaranteed, e.g.
downlink channels under one cell,
uplink channels from a single user;
- uplink signals from different users are not time synchronised.
CONFIDENTIAL
Channelization codes
Channelization codes are very
important in downlink, since they
are used for multiplexing (at the
transmitter) and separating (at the
receiver) the signals intended for
different terminals.
In uplink, channelization codes are
used for multiplexing the data and
control channel (DPDCH and
DPCCH) signals transmitted from a
single terminal.
In both directions, the
channelization codes are employed
for spreading the channel bits to the
final chip rate of 3.84 Mchips/s.
CONFIDENTIAL
SF=
2
SF=
4
SF=
8
C16(0)=[......
......]
C16(1)=[......
C4(0)=[111
......]
C16(2)=[......
1]
C8(1)=[1111-1-1-1- ......]
C16(3)=[......
1]
......]
C16(4)=[......
C8(2)=[11-1-111- ......]
C16(5)=[......
1-1]
C4(1)=[11-1......]
C16(6)=[......
1]
C8(3)=[11-1-1-1-111]
......]
C16(7)=[......
......]
C16(8)=[......
C8(0)=[1-11-11......]
C16(9)=[......
11-1]
C4(2)=[1......]
C16(10)=[......
11-1]
C8(5)=[1-11-1-11-11]
.....]
C16(11)=[........
...]
C16(12)=[....
C8(6)=[1-1-111-1- .......]
C16(13=[......
11]
C4(3)=[1-1.....]
C16(14)=[....
11]
C8(7)=[1-1-11-111- .......]
C16(15)=[....
1]
.......]
C8(0)=[111111
11]
C2(0)=[11]
C0(0)=[
1]
C2(1)=[11]
SF=1
6
...
SF=25
6
CONFIDENTIAL
384 user #2
384 user #1
Signaling
SF
4
SF
8
SF
16
128 user #1
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
In the Uplink
Channelization
Codes
signaling
data
In the Downlink
In the Downlink
(Node B UE),
(Node BUE),
Scrambling Codes
CONFIDENTIAL
Usage
Channelization code
Scrambling code
Uplink: Separation of
physical data and control
channels from the same
terminal
Uplink: Separation of
terminals
Downlink: Separation of
downlink dedicated user
channels
Downlink: Separation
of sectors (cell)
Length
Fixed
Number of
codes
Uplink: Several
million
Downlink: 512
CONFIDENTIAL
10
00
I
11
01
101
1
100
1
000
1
001
1
101
0
100
0
000
0
001
0
111
0
110
0
010
0
011
0
111
1
110
1
010
1
011
1
QPSK
16QAM
2 bits / symbol =
480 kbit/s/HS-PDSCH =
max. 7.2 Mbit/s
4 bits / symbol =
960 kbit/s/HS-PDSCH =
max. 14.4 Mbit/s
The higher order modulations need a much better SNR because when an error occurs on
one symbol, more bits are lost.
Example: EDGE (Enhanced Data rates for GSM Evolution) uses an 8-PSK modulation scheme. It can provide data
rates up to 380 kbps, but only for users close to the base station (in a 100 m radius approximately),
Rake Receiver
CONFIDENTIAL
CDMA uses the multipath signals and combines them to make an even stronger
signal at the receivers due to its wide bandwidth and Rake receivers
It is essentially a set of four or more receivers
One of the receivers (fingers) constantly searches for different multipath and
helps the other 3 fingers to lock into strong multipath signals which have more
than one chip delay
Each finger then demodulates the signal corresponding to a strong multipath
and then the results are combined together to make a stronger signal
CONFIDENTIAL
MS
RAKE
Receive
r
Summed signal
Node B
Node B
Node B
S-RNC
D-RNC
Core Network
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
UE
Node B
RNC
Logical channels
Transport channels
Physical
channels
Frames
CONFIDENTIAL
: Logical Channels
Logical Channels were created to transmit a specific content.
There are for instance logical channel to transmit the cell system information,
paging information, or user data.
Logical channels are offered as data transfer service by the Medium Access
Control (MAC) layer to the next higher layer.
Consequently, logical channels are in use between the mobile phone and the
RNC.
Transport Channels (TrCH)
The MAC layer is using the transport service of the lower, Physical layer.
The MAC layer is responsible to organise the logical channel data on transport
channels. This process is called mapping. In this context, the MAC layer is also
responsible to determine the used transport format.
The transport of logical channel data takes place between the UE and the RNC.
Physical Channels (PhyCH)
The physical layer offers the transport of data to the higher layer.
The characteristics of the physical transport have to be described.
When we transmit information between the RNC and the UE, the physical
medium is changing.
Between the RNC and the Node B, where we talk about the interface Iub, the
transport of information is physically organised in so-called Frames.
Between the Node B and the UE, where we find the WCDMA radio interface Uu,
the physical transmission is described by physical channels.
A physical channel is defined by the UARFCN and the a spreading code in the FDD
CONFIDENTIAL
BCH
SCH-1/SCH-2
(created in
NodeB)
CCPCH-1
PCCH CCCH
PCH
CTCH
FACH
CCPCH-2
DCCH DTCH
DCH
DSCH
PDSCH
DPCH
(DPDCH+DPCCH)
Logical Channels
Transport Channels
Physical Channels
Logical Channels:
Transport Channels:
Physical Chs:
characterised by
UARFCN,
scrambling code,
channelization
code (optional),
start and stop
time, and
relative phase
CONFIDENTIAL
DTCH
RACH
PRACH
L o g ic a l C h a n n e ls
DCCH
DCH
DPDCH
DPCCH
CPCH
T r a n s p o r t C h a n n e ls
PCPCH
P h y s ic a l C h a n n e ls
Logical Channels:
Transport Channels:
Physical Chs:
characterised by
UARFCN,
scrambling code,
channelization
code (optional),
start and stop
time, and
relative phase
CONFIDENTIAL
Broadcast Channel
Broadcast Channel (Downlink)
Broadcast Control Channel (BCCH) [Logical/L3]
Broadcast Channel (BCH) [Transport/L2]
Primary Common Control Physical Channel (PCCPCH) [L1]
First channel to be decoded by UE after acquisition
Carries system information such as system ID, cell ID,
neighbor cell information, system frame number, etc.
The BCCH Logical Channel carries system information
messages necessary for the UE to camp on a WCDMA cell
and to access the system.
UTRAN broadcasts this channel continuously, repeating the
system information messages at a system configurable
repetition rate.
The UE typically reads this channel after power-up or when
camping on a new cell and periodically thereafter to ensure that
the UE has current system information.
CONFIDENTIAL
Paging Channel
Paging Channel (Downlink)
Paging Control Channel (PCCH)
Paging Channel (PCH)
Secondary Common Control Physical Channel
(SCCPCH)
Page Indicator Channel (PICH)
Monitored by UE in Idle Mode, CELL_PCH, and
URA_PCH
Carries Paging messages
The PCCH Logical Channel carries paging messages to
notify the UE of incoming calls. It is used in conjunction
with the physical Page Indicator Channel (PICH).
UTRAN broadcasts the PCH continuously, but the UE
typically only monitors the PICH during assigned slots
CONFIDENTIAL
CONFIDENTIAL
Dedicated Channels
Dedicated Channels (Uplink/Downlink)
Dedicated Control Channel (DCCH) [Logical/L3]
Dedicated Traffic Channel (DTCH) [Logical/L3]
Dedicated Channel (DCH) [Transport/L2]
Dedicated Physical Data Channel (DPDCH)
Dedicated Physical Control Channel
(DPCCH)
Carries signaling and user data
CONFIDENTIAL
Slot Timing
2560 chips per slot, 0.67 ms
Symbol Timing
Symbol consists of a number of chips
OVSF determines chips/symbol
OVSF ranges from 4 to 512 chips/symbol
(640 to 5 symbols per slot)
- AMR12.2kbps: SF=128 => 128 chips/symbol => 640/128=5 symbols/slot
- PS384kbps: SF=8 => 8 chips/symbol => 640/8=5=80 symbols/slot
CONFIDENTIAL
CONFIDENTIAL
There is only one type of downlink dedicated physical channel, the Downlink
Dedicated Physical Channel (downlink DPCH).
Within one downlink DPCH, i.e. the dedicated transport channel (DCH), is
transmitted in time-multiplex with control information (known pilot bits, TPC
commands, and an optional TFCI).
The downlink DPCH can thus be seen as a time multiplex of a downlink
DPDCH and a downlink DPCCH.
CONFIDENTIAL
CONFIDENTIAL
A UE is always able to find the MIB on the BCCH and to get the
scheduling information for the other SIBs
The SIBs contain all information necessary for UEs to work
properly in both Idle and Connected mode
UE timers and counters, Cell selection and reselection parameters, Common
Physical Channel parameters, Measurement parameters, Neighbor list
parameters
CONFIDENTIAL
NEMO
BCH, MIB, SIB (1)
CONFIDENTIAL
NEMO
BCH, MIB, SIB (2)
CONFIDENTIAL
NEMO
BCH, MIB, SIB (3)
CONFIDENTIAL
NEMO
BCH, MIB, SIB (4)
Cell & Common Channel Configuration
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
P-CCPCH
coverage
Pilot
coverag
e
CPICH
= 33dBm
P-CCPCH = 28 dBm (-5)
SCH1= SCH2 = P-CCPCH = 28dBm (-5)
CONFIDENTIAL
CONFIDENTIAL
The UMTS signaling protocol stack is divided into Access Stratum (AS) and NonAccess Stratum (NAS).
The Access Stratum architecture is new for WCDMA, and will see in a
bit more detail in the next slides
CONFIDENTIAL
The control plane protocol stack illustrates how signaling protocols are
terminated. This example shows a circuit-switched call operating on
dedicated Physical Channels.
CONFIDENTIAL
The user plane protocol stack illustrates how user protocols are
terminated. This example shows a circuit-switched voice call operating on
dedicated Physical Channels.
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
UE Call States
UE Call States
CONFIDENTIAL
Idle Mode
The UE operates in Idle mode whenever it has no active CS or PS call.
UE monitors the PCH and the associated PICH. It may sleep between paging cycles, by disabling some of its circuitry
to improve standby time.
CELL_DCH State
The CELL_DCH state may be entered from the Idle Mode when an RRC connection is established, or when a Dedicated
Physical Channel is established from the CELL_FACH state.
PS call may operate in CELL_DCH state, especially if it is a high data transfer
CELL_FACH State
The CELL_FACH state may be entered from the Idle Mode when an RRC connection is established or from the
CELL_DCH state when directed by UTRAN to release dedicated channels
UE continuously monitors the FACH, because UTRAN can send it data or signaling at any time (no sleeping!).
CELL_PCH State
The CELL_PCH state may be entered from the CELL_FACH state, when UTRAN detects a lack of activity from the UE
during a PS call.
Similar to Idle Mode, the UE monitors the PCH and the associated PICH. It may sleep between paging cycles. If the UE
has data or signaling to send, it autonomously transitions to CELL_FACH and transmits on the RACH. The network
knows which cell is camped under and pages that cell only. UE is required to perform a cell update procedure (from
CELL_FACH) whenever its location changes to a new cell.
URA_PCH State
The URA_PCH state is similar to the CELL_PCH state, except that it is used when UTRAN detects very low activity from
the UE during a PS call and wants to limit the number of cell update procedures performed by the UE.
The UE is required to perform a URA update procedure (from CELL_FACH) whenever its location changes to a new
routing area. Because a routing area may encompass many cells, the frequency of updates is much lower than for the
CELL_PCH state. The tradeoff is that UTRAN must page the UE in all cells of the routing area, rather than in just a single
cell. [URA: UTRAN Registration Area}
Thank You
Confidential
CONFIDENTIAL
Support Slides
CONFIDENTIAL
Transport Channels
(Layer 2)
Physical Channels
(Layer 1)
Null Data
BCCH
Broadcast Control Ch.
BCH
Broadcast Ch.
Data
Encoding
PCCH
Paging Control Ch.
PCH
Paging Ch.
Data
Encoding
CCCH
Common Control Ch.
CTCH
Common Traffic Ch.
Cch 256,0
P-CCPCH(*)
S/P
Primary Common Control Physical Ch.
Cch 256,1
FACH
Data
Forward Access Ch. Encoding
Sync Codes(*)
Gain
PSC
Gain
GP
SSCi
Cch
GS
Gain
DCH
Data
Dedicated Ch. Encoding
DTCH
Dedicated Traffic Ch. 1
DCH
Data
Dedicated Ch. Encoding
M
U
X
Cell-specific
Scrambling
Code
DPDCH (one or more per UE)
Dedicated Physical Data Ch.
M
U
X
S/P
Cch
DCH
Data
Dedicated Ch. Encoding
Pilot, TPC, TFCI bits
SHCCH
DSCH Control Ch.
S/P
S-CCPCH
S/P
Secondary Common Control Physical Ch.
DCCH
Dedicated Control Ch.
DTCH
Dedicated Traffic Ch. N
CPICH
Common Pilot Channel
DSCH
Data
Downlink Shared Ch.Encoding
Access Indication data
Paging Indication bits
Access Preamble Indication bits
Gain
I+jQ
Downlink
RF Out
I
Q
Filter
Filter
I/Q
Modulator
S/P
AICH
(Acquisition Indication Channel)
S/P
PICH
(Paging Indication Channel )
S/P
AP-AICH
S/P
(Access Preamble Indication Channel )
CSICH
(CPCH Status Indication Channel )
CD/CA-ICH
S/P
(Collision Detection/Channel Assignment )
S/P
Gain
Cch
Gain
Cch
Gain
Cch
Gain
Cch
Gain
Cch
Gain
CONFIDENTIAL
Transport Channels
(Layer 2)
CCCH
Common Control Ch.
RACH
Random Access Ch.
Physical Channels
(Layer 1)
Data
Coding
Chd
Gd
PRACH
Physical Random Access Ch.
CPCH
Common Packet Ch.
Data
Coding
Chc
Gc
Chd
Gd
PCPCH
Physical Common Packet Ch.
UE
Scrambling
Code
Uplink
RF Out
Chc
CCTrCH
DCCH
Dedicated Control Ch.
DCH
Data
Dedicated Ch. Encoding
DTCH
Dedicated Traffic Ch. 1
DCH
Data
Dedicated Ch. Encoding
DTCH
Dedicated Traffic Ch. N
DPDCH #1
Dedicated Physical Data Ch.
DPDCH #3 (optional)
Dedicated Physical Data Ch.
M
U
X
DCH
Data
Dedicated Ch. Encoding
DPDCH #5 (optional)
Dedicated Physical Data Ch.
DPDCH #2 (optional)
Dedicated Physical Data Ch.
DPDCH #4 (optional)
Dedicated Physical Data Ch.
DPDCH #6 (optional)
Dedicated Physical Data Ch.
Chd,1
Gd
Chd,3
Gd
Chd,5
Gd
Chd,2
Gd
Chd,4
Gd
Chd,6
Gd
Chc
Gd
DPCCH
Dedicated Physical Control Ch.
Gc
Q
j
I+jQ
I
Q
Filter
Filter
I/Q
Mod.
CONFIDENTIAL
Signaling Diagrams
CONFIDENTIAL
Mobile Originating
Call Setup
[CS Services]
Figure shows
the procedure
for the Mobile
Originating Call
Setup.
The Procedure
starts with RRC
Connection
Request and
ends with
Connect Ack.
CONFIDENTIAL
Mobile Terminating
Call Setup
[CS Services]
Figure shows
the procedure
for the Mobile
Terminating
Call Setup.
CONFIDENTIAL
Terminating SMS
The procedure
for mobile
terminated
SMS is shown
CONFIDENTIAL
RAB Establishment
(MS initiated) [PS
Services]
CONFIDENTIAL
The UE shall
perform a GPRS
Attach to the SGSN
in order to obtain
access
to the GPRS
services. The
Packet Service
Attach including
PDP Context
Activation
procedure
Contents
WCDMA/UMTS Network Architecture
Core Network Element Overview
UTRAN Network Element Overview
Radio Access Bearer
Introduction to Air-Interface
UMTS-FDD Carriers
Spreading & Processing Gain
DL & UL Channelization Codes
Channel Organization/Mapping in UMTS
DL Common Control Channel Power Settings
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL
Code Groups
0
1
2
3
.
.
.
.
.
63
0
8
16
24
.
.
.
.
.
504
1
9
17
25
.
.
.
.
.
505
2
10
18
26
.
.
.
.
.
506
3
11
19
27
.
.
.
.
.
507
4
12
20
28
.
.
.
.
.
508
5
13
21
29
.
.
.
.
.
509
6
14
22
30
.
.
.
.
.
510
7
15
23
31
.
.
.
.
.
511
CONFIDENTIAL
CONFIDENTIAL
Set C: 9 groups for In-building, Micro and tested cells which can
support
9 x 8codes = 72 codes = 72 cells
CONFIDENTIAL
CONFIDENTIAL
R1
R2
R3
R4
R5
R6
R7
R8
CONFIDENTIAL
CONFIDENTIAL
Example of
KV Re-Use
Pattern of
the 8
Polygons
CONFIDENTIAL
Coding Scheme
CS-1
CS-2
CS-3
CS-4
N (number of bytes)
23
33
39
53
Number of TS
CS-1
1
9200
2
9200*2=18400
3
9200*3=27600
4
9200*4=36800
CS-2
CS-3
13200
15600
13200*2=26400 15600*2=31200
13200*3=39600 15600*3=46800
13200*4=52800 15600*4=62400
CS-4
21200
21200*2=42400
21200*3=63600
21200*4=84800
Number of TS
CS-1
CS-2
CS-3
CS-4
1
8000
12000
14400
20000
2
8000*2=16000 12000*2=24000 14400*2=28800 20000*2=40000
3
8000*3=24000 12000*3=36000 14400*3=43200 20000*3=60000
4
8000*4=32000 12000*4=48000 14400*4=57600 20000*4=80000
Table 11. LLC Theoretical Maximum Throughput (bits/s)
CONFIDENTIAL
Slides removed
CONFIDENTIAL
CONFIDENTIAL
CONFIDENTIAL