Professional Documents
Culture Documents
Agenda
UTRAN functionality and working principle
WCDMA Basics Power, FDD, TDD and Cell Characteristics Scrambling code and channelization code concept. Structure of UMTS air interface, Modulation, Transport, Physical and Logical channels Radio Resource management HSDPA and HSUPA concepts Agenda
1. .. 2. . a) . b) .
WCDMA Basics
The subscriber may use variable bit rates to transfer data. Subscribers need more frequency to transfer data.
CDMA Sequencing
The following two techniques can be used for CDMA sequencing: 1. Frequency Hopping (FH) Sequencing In this technique the
information to be transmitted is located in different parts of the frequency band as a function of time, according to a certain hopping sequence.
The block is a variable, its volume is constant, only the sizes of the edges change. Therefore, you can calculate the volume as follows:
Volume of block = L X B X H Here, length is the frequency band which is constant for WCDMA as 5 MHz breadth is the spreading factor and height is the power. The volume of the block is constant before and after transmission of the data.
960
960
8
4
480
960
960
1,920
WCDMA Carrier
The WCDMA Carrier
Bandwidths defined for the WCDMA, 5, 10, and 20 MHz. 5 MHz is the most commonly used bandwidth. 10 and 20 MHz alternatives will provide more capacity, but the occupancies occurring in the desired frequency band set some limits.
190 MHz
1.92 GHZ
1.98 GHZ
. . . . .
2.11 GHZ
2.17 GHZ
UMTS UPLINK
UMTS DOWNLINK
1.8 GHZ
1.85 GHZ
1.9 GHZ
1.95 GHZ
2.0 GHZ
2.05 GHZ
2.1 GHZ
2.15 GHZ
2.2 GHZ
Value
Direct Sequence CDMA
This improves the effectiveness of the available spectrum resources because data traffic patterns tend to heavily favor downlink.
Spreading in WCDMA
Spreading means increasing the signal bandwidth
Scrambling Code
Data
Bit rate
Chip rate
Chip rate
Channelization Codes
Channelization codes are orthogonal codes These are based on Orthogonal Variable Spreading Factor (OVSF) They are of length 4 - 512 chips long (1.04-133.34s) depending on the channel and required bit rate of the service. Channelization codes are used for channel separation both in uplink and downlink direction. In DL, it can separate different users within one cell/sector. Channelization codes have different spreading factor values and therefore different symbol rates. The channelization code length is one symbol.
SF = 1
SF = 2
SF = 4
Scrambling Code
In the scrambling process the code sequence is multiplied with a pseudorandom scrambling code. Only one primary scrambling code is allocated for a cell. The scrambling code can be a long code or a short code
Code period is of 10 ms Gold Code with 10 ms period or short code S(2) code
In the downlink, scrambling codes are used to reduce the inter-base station interference In the downlink direction, always long scrambling codes are used. In the uplink direction, there are millions of scrambling codes available. All uplink channels may use either short or long scrambling codes
Long codes are used if the base station uses the RAKE receiver.
Usage
Uplink: Separation of physical data and control channels from the same terminal Downlink: Separation of downlink dedicated user channels Variable (depends on the user allocation)
Uplink: Separation of terminals Downlink: Separation of sectors (cell) Fixed Uplink: Several millions Downlink: 512
Length
Rake Receiver
In WCDMA, the terminal employs a RAKE receiver to handle Multipath propagation. The RAKE consists of receivers, adjustable-by-system delay functionality, code generator, and gain and phase tuning equipment.
Rake Receiver
Simplified Block Diagram of the RAKE Receiver
DS-WCDMA-FDD Frame
One basic frame is divided into 15 slots, with each slot measuring 2/3 ms in length. The frame length is 10 ms. This timing structure is mainly required for the synchronization Signal arrangements does not impact the Channelization Every WCDMA frame is numbered by the System Frame Number (SFN) according to the 3GPP specifications. This has been done to ensure the inter-operability between GSM and WCDMA.
Symbol
A symbol is a data unit transmitted over the Air Interface. In the downlink transmission, each symbol represents two bits. Bits can be represented as a tuple (x1, y2). In the tuple, x1 and y2 each represent one bit.
WCDMA Channels
Transport Channels
Between the MAC and Physical layers
Physical Channels
Between Physical Layers at the Node-B and UE
Traffic Channels
DTCH Dedicated Traffic Channel CTCH Common Traffic Channel
Dedicated Channels
DCH Dedicated Channel DSCH Downlink Shared Channel
Dedicated Channels
The Dedicated Physical Data Channel (DPDCH)
It is used to carry user information
BCCH
Broadcast Control Channel, (system information)
PCCH
Paging Control Channel (paging & notification)
PCH
Paging Channel
CCCH
Common Control Channel (control information without RRC connection)
FACH
Forward Access Channel
DSCH DCCH
Dedicated Control Channel (power control, TFI, etc.) Downlink Shared Channel
DCH
DTCH
Dedicated Traffic Channel (user data) Dedicated Channel
CCCH
Common Control Channel (control information without RRC connection)
CPCH
DCCH
Dedicated Control Channel (power control, TFI, etc.)
DCH DTCH
Dedicated Traffic Channel (user data)
Dedicated Channel
DS-WCDMA-FDD Channels
The increase in the downlink data rate and the actual cell throughput are due to three main factors:
adaptive modulation and coding fast scheduling fast retransmission.
Characteristics of a Bearer
The following figure describes the Network Bearer:
The following figure explains data and speech is routed through the bearer:
Characteristics of a Bearer
Managing the Bearer Through The Network The UMTS network is responsible for establishing a flexible bearer for subscriber data transport between the Mobile Terminal (MT) and the external networks. The following figure explains the QoS management in the control plane:
Types of bearer
A bearer has different parameters, such as variable data rates, protection and delay. The bearer is dependent on the service required. RNC makes the decision about bearer
The above figure demonstrates this transmission through the use of pipes between elements in the network
Characteristics of a Bearer
Managing the Bearer over UTRAN The following figure shows how the different RABs are received by the RNC and combined together to form a single RRC connection:
3G MSC RNC
3G SGSN RNC
RNC
3G MSC RNC
3G SGSN RNC
RNC
3G MSC RNC
NOTE: Those BTS with an active connection are known to be part of the active set.
3G MSC RNC
3G SGSN RNC
RNC
The RNC is known as the serving (S-RNC) and the new RNC is the drift (D-RNC). Note that the Iu connection is still from the S-RNC.
3G MSC RNC
3G MSC RNC
Paging Procedure
Paging Type 1 is used by CN domains. Paging those UEs who are in idle mode (no RRC connection). Paging Type 2 is used for paging those UEs who are in cell dedicated channel (RRC connected).
Paging Type 1
Paging Type 2
CS Inter System Hand Over (ISHO) from the UTRAN to the GERAN
3GPP specifications define HO between two radio accesses to be a mandatory requirement of the system.
MM Procedure
UE performs cell update when:
Cell reselection. Periodic cell update. Uplink data transmission. Paging response. Re-entering the service area.
The RNC maintains the registration of the current URA for each UE. URA consists of a number of cells belonging to either one RNC or several RNCs.
Cell update
URA update
User Authentication
The UE and the network authenticate each other by sending the MM authentication request message. UE responds with an MM authentication response message.
PDH
397200 Kbit/s
X4
4.
97728Kbit/s
X3
274176 Kbit/s
X3
X6
139264 Kbit/s
X4
3.
32064 Kbit/s
X7
44736 Kbit/s
34368 Kbit/s
X4
X5
6312 Kbit/s
X4
X3
8448 Kbit/s
X4
1544 Kbit/s
X 24
2048 Kbit/s
X 30
64 Kbit/s
PDH Multiplexing
Non standard
Carrier Equipment
E4 - 140 MB
EOW Supervisory
Non standard
E4 - 140 MB
E3 - 34 MB
Primary Mux
Primary Mux
Dropped Channels
Dropped Channels
PDH Limitations
Inability to identify individual channels in a higher-order bit stream Insufficient capacity for network management Most PDH network management is proprietary
There is no standardised definition of PDH bit rates greater than 140 Mbit/s
There are different hierarchies in use around the world. Specialized interface equipment is required to interwork between two hierarchies.
SDH
Why SDH?
Provides solution to PDH Problems
STM-1 Frame
270 columns (byte)
9 261
RSOH
9 rows (bytes)
P
AU Pointer
O
MSOH
Payload VC-4
2430 bytes/frame 8 bit/byte 8000 frame/s = 155.52 Mbit/s transmitted from top to bottom and left to right
R SO H
9 row s
S ec tion O verhead
A1 B1 D1
A1
A1
B2 B2 D4 D7 D10 S1 Z1
B2
Z1
RSOH
MSOH
ATM Basics
Contents
Synchronous and Asynchronous Multiplexing Network Transfer Mode ATM Technology ATM Cell ATM in 3G Networks ATM Connections ATM Switching
B C
Synchronous Multiplexing
Asynchronous Multiplexing
Drawbacks:
Waste of physical bandwidth in data networks No over-subscription in the service provider network Inflexible bandwidth, not ideal for burst traffic
Maximum number of connection equals maximum number of timeslots Ideal for uncompressed voice networks
Drawbacks:
No guarantees for delay and jitter
Ideal for data networks with less demand of the quality of service Variable length and delivery of packets Flexible bandwidth
ATM cells
48-octet Payload
Drawbacks:
Most applications are based on IP instead of ATM A lot of overhead for IP over ATM Complicated protocol architecture
What is ATM?
ATM = Asynchronous Transfer Mode Fast packet switching and multiplexing technology (cell-based ) Support the universe of services
voice, video and data traffic
Provides quality of service guarantee and reliability Offers "bandwidth on demand" Connection-oriented, no error correction for user traffic
error correction for user traffic is handled by the end user the advantages are increased speed of switching and elimination of associated delay
ATM Cell
Header contains routing and error control information Payload carries the actual user information, either voice, data or video
Iub
Uu UE
A MSC
B PSTN
BS UNI
Iur NNI
UNI BS RNC UNI BS SGSN GGSN IP network Iu-PS NNI
Gn
Gi
UNI NNI
ATM Cell
Provides local functions, such as identifying multiple stations that share a single ATM interface The 1st bit - indicates whether the cell contains user data or control data The 2nd bit - indicates congestion
3 2 VPI VCI
5 VPI
3 2
VPI VCI
VCI
PT
CLP
PT
CLP
Payload
Interpretation
User data cell No congestion More data to come User data cell No congestion Last cell User data cell Congestion More data to come User data cell Congestion Last cell
100 101
110 111
Virtual Channel Segment OAM flow F5 Virtual channel end to end OAM flow F5
Resource Management Cell Reserved
48 bytes
PAYLOAD
Transmission path
Segregation of traffic
A form of priority control can be implemented by segregating traffic types requiring different quality of service (QoS)
Port
VCI 9 VCI 10
VPI 3 VP switch
VPI 36 VPI 8
VCI 15 VCI 26
VCI 9 VCI 10
VPI 23
VPI 9
Port
VCI 9 VCI 10
BTS 5 VC3, VC4, VC5, VC6 / VP7 VC5 / VP5 AXC AXC / ATM switch BTS 6 VC6 / VP6 AXC VC/VP CROSSCONNECTION TABLE VC3/VP4 <-> VC3/VP 7 VC4/VP4 <-> VC4/VP 7 VC5/VP5 <-> VC5/VP 7 VC6/VP6 <-> VC6/VP 7
Peak cell rate of traffic type 1 Peak cell rate of traffic type 2 Peak cell rate of traffic type 3
Statistical multiplexing
Deterministic multiplexing
Most of the traffic sources send For a group of bursty connections, bursty traffic and with a high less bandwidth can be reserved probability all the sources do not than if bandwidth reservation simultaneously transmit at their would be based on the peak rate peak rate of the connections One of the proposed advantages of ATM is that statistical multiplexing gain can be utilized
Thank You
Cognitel Training Services (P) Ltd.
A-10, Infocity-I, Sector-34, Gurgaon Haryana (INDIA)-122001 www.cognitel.in