Professional Documents
Culture Documents
Background and Introduction Background and Introduction To 1xEV-DO Technology To 1xEV-DO Technology
This course can be downloaded free from our website:
www.howcdmaworks.com/340.pdf
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 1
Contents
Survey of Wireless Data Technologies and 1xEV-DO Purpose of 1xEV-DO and Differences from 1xRTT ITU requirements and user application capabilities Exploiting rapidly-changing channel conditions Channel Structure, Power Control, Unique Features 1xEV-DO transmission details Codes, Channels, MAC Indices Hybrid ARQ process 1xEV-DO Access Terminal Architecture Route Update Operation 1xEV-DO Network Elements and Architecture Lucent, Motorola, Nortel 1xEV-DO Layer-3 Messaging 1xEV-DO/1xRTT Interoperability Summary Review of 1xEV-DO Protocols
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 2
Total Wireless Users GSM users CDMA users TDMA users IDEN users Analog users
Worldwide 1,320,000,000 100% 870,000,000 65.9% 224,000,000 17.0% 124,000,000 9.4% 68,000,000 5.2% 34,000,000 2.6%
Total Worldwide Wireless customers surpassed total worldwide landline customers at year-end 2002, with 1,00,080,000 of each. 2/3 of worldwide wireless customers use the GSM technology CDMA is second-most-prevalent with 17.0% In the US, CDMA is the most prevalent technology at 45.7% Both CDMA and GSM are growing in the US most IS-136 TDMA systems are converting to GSM + GPRS + EDGE
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 3
TDMA 9%
Analog 3%
IDEN 5%
IDEN 8%
GSM 24%
CDMA 17%
GSM 66%
CDMA 46%
GSM is by far the dominant global technology CDMA is dominant in its country of origin, the USA The IS-136 TDMA community is rapidly implementing GSM primary motivation is to provide GPRS and/or EDGE fast data
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 4
ETSI / GSM
GSM CSD
9.6 4.8 kb/s
ANALOG
AMPS Cellular
9.6 4.8 kb/s w/modem
PAGING
Mobitex
9.6 4.8 kb/s obsolete
IS-95B
64 -32 kb/s
GSM HSCSD
32 19.2 kb/s
CDPD
19.2 4.8 kb/s discontinued
1xRTT RC3
153.6 80 kb/s
GPRS
40 30 kb/s DL 15 kb/s UL
1xRTT RC4
307.2 160 kb/s
EDGE
200 - 90 kb/s DL 45 kb/s UL
1xEV-DO
2400 600 DL 153.6 76 UL
WCDMA 0
384 250 kb/s
1xEV-DO A
3100 800 DL 1800 600 UL
WCDMA 1
2000 - 800 kb/s
TD-SCDMA
In Development
1xEV-DV
5000 - 1200 DL 307 - 153 UL
WCDMA HSPDA
12000 6000 kb/s
Flarion OFDM
1500 900 kb/s
This summary is a work-in-progress, tracking latest experiences and reports from all the high-tier (provider-network-oriented) 2G and 3G wireless data technologies Have actual experiences to share, latest announced details, or corrections to the above? Email to Scott@ScottBaxter.com. Thanks for your comments!
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 5
CDMA2000 / IS-2000 2.5G? 3G 3G 3G IS-2000: IS-2000: 1xEV-DO 1xEV-DO 1xEV-DV Rev. 0 Rev. A 1xRTT 3xRTT 1xTreme IS-856 IS-856
RL FL RL FL RL FL RL FL RL FL
2G
2G
1250 kHz. F: 3x 1250k 30 kHz. 1250 kHz. 1250 kHz. R: 3687k 50-80 voice 120-210 per 1 20-35 25-40 3 carriers and data 14.4K 64K 153K 307K 230K
Enhanced Access Channel Structure
1250 kHz. 1250 kHz. 59 active Many packet users users 3.1 Mb/s DL 1.8 Mb/s UL Higher data rates on dataonly CDMA carrier 5 Mb/s
1-2005
340 - 6
QPSK
CDMA IS-95, IS-2000 1xRTT, and lower rates of 1xEV-DO, DV
16QAM
1xEV-DO at highest rates
64QAM
1xEV-DV at highest rates
1-2005
340 - 7
various
UMTS GPRS EDGE UTRA WCDMA 3.84 MHz. 200 kHz. 200 kHz. up to 200+ Many fast data voice users Pkt. users many users and data 9-160 Kb/s 384 Kb/s (conditions mobile user determine) 2Mb/s static user
various
none
various
Integrated Packet IP 8PSK for voice/data access 3x Faster (Future rates Multiple data rates to 12 MBPS attached than GPRS using adv. users modulation?)
1-2005
340 - 8
none
Integrated Packet IP 8PSK for voice/data access 3x Faster (Future rates Multiple data rates to 12 MBPS attached than GPRS using adv. users modulation?)
1-2005
340 - 9
Technology Frequency Band Access Method Modulation Type Max Raw Data Rate
802.20
Mobile BWA
various 4 Mb/s
CCK
FSK or BPSK, QPSK, BPSK to 16QAM, or 256QAM GMSK 64QAM OFDM 23.5 Mb/s 54 Mb/s 54 Mb/s
11 Mb/s
54 Mb/s
BLUETOOTH
802.11A, B, WIFI, WILAN
Infrared IRDA
1-2005
340 - 10
4G Evolution or Revolution?
Technology Environment
Service Provider/ Infrastructure Owner
High-Tier $$$
Near-Universal Macro-Coverage
PSTN
IP/VPNs
Low-Tier $
Hotspots
freenetworks.org
Theres a revolution going on! New 2.5G services arriving now, new 3G arriving 2002 through 2005 A groundswell of commercial (and even free!) WILAN deployment 3G networks and 4G networks have their own unique advantages Ultimately 3G and 4G will be integrated by wireless operators!
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 11
1-2005
340 - 12
Why 1xEV-DO?
To satisfy the ITU 3G vision of four radio environments: 9600 bps megacells met by satellite-based systems 144 kbps macrocells met by CDMA2000 1xRTT RC3 384 kbps microcells met by CDMA2000 1xRTT RC4 (307k) 2 mbps picocells met by 1xEV-DO and 1xEV-DV To provide new applications for CDMA2000 users high speed data access and web applications in the mobile environment speeds up to 2.4 mbps
1-2005
340 - 13
1-2005
340 - 14
0.4
0.5
Fast Fading due to user motion through multipath fading standing-wave pattern
Radio Transmission Technologies must be nimble enough to quickly adapt for best results during changing channel conditions in choosing what data rate to transmit in power control of the forward and reverse links
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 15
+4 +2 +0 -2 0 0.1
+6
GOOD CONDITIONS
BAD CONDITIONS
Path Loss, db 0.2 0.3 Time, Seconds 0.4 0.5
BTS F-SCH
Setup Time
F-FCH
Fixed Rate!
F-SCH Burst
SCH-Assignment Msg.
R-FCH MOBILE R-SCH T seconds 0 1-2005 0.1 0.2 0.3 0.4 340 - 16 0.5
1xEV-DO
Traffic DRC
AT
1xRTT
BTS F-SCH
Setup Time
F-FCH
Fixed Rate!
F-SCH Burst
SCH-Assignment Msg.
R-FCH MOBILE
SCH-Request Msg.
R-SCH
1xEV-DO
Traffic DRC
AT
Each forward traffic channel subpacket is only 1.67 ms long The flow of subpackets is stopped immediately when successful decoding is achieved. The reaction to channel conditions is effectively instantaneous, with no wasted excess energy! Short preambles and embedded MAC bits identify the destination mobile No time is wasted sending layer-3 messages to control packet flow Each mobile DRC request is based on latest channel condition ACK/NAK commands can stop unneeded subpacket repetitions in less than 5 ms.!
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 18
The Key Features The Key Features and Structure of 1xEV-DO and Structure of 1xEV-DO
1-2005
340 - 19
BTS
F-FCH4 W53
ATs
1xEV-DO
AP
(Access Terminals)
(Access Point)
AP
340 - 20
POWER MANAGEMENT IS-95 and 1xRTT: sectors adjust each users channel power to maintain a preset target FER 1xEV-DO IS-856: sectors always operate at maximum power sector output is timemultiplexed, with only one user served at any instant The transmission data rate is set to the maximum speed the user can receive at that moment
1-2005
power
5 4 2
time
power
time
340 - 21
EV-DO
AT
Access Terminal
AP
Access Point
1-2005
340 - 22
1-2005
340 - 23
All members of the CDMA family - IS-95, IS-95B, 1xRTT, 1xEV-DO and 1xEV-DV transmit Frames One Cycle of PN Short Code IS-95, IS-95B, 1xRTT frames are usually 20 ms. long 1xEV-DO frames are 26-2/3 ms. long same length as the short PN code One 1xEV-DO Frame each 1xEV-DO frame is divided into 1/16ths, called slots The Slot is the basic timing unit of 1xEV-DO transmission Each slot is directed toward somebody and holds a subpacket of information for them Some slots are used to carry the control channel for everyone to hear; most slots are intended for individual users or private groups Users dont own long continuing series of slots One Slot like in TDMA or GSM; instead, each slot or small string of slots is dynamically addressed to whoever needs it at the moment
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 24
Whats In a Slot?
Slot 1024 chips Slot 1024 chips
PILOT
PILOT
MAC
MAC
MAC
SLOT
DATA
400 chips
DATA
400 chips
DATA
400 chips
MAC
DATA
400 chips
64
96
64
64
96
64
The main cargo in a slot is the DATA being sent to a user But all users need to get continuous timing and administrative information, even when all the slots are going to somebody else Twice in every slot there is regularly-scheduled burst of timing and administrative information for everyone to use MAC (Media Access Control) information such as power control bits a burst of pure Pilot allows new mobiles to acquire the cell and decide to use it keeps existing user mobiles exactly on sector time mobiles use it to decide which sector should send them their next forward link packet
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 25
PILOT
PILOT
MAC
MAC
MAC
SLOT
empty
400 chips
empty
400 chips
empty
400 chips
MAC
empty
400 chips
64
96
64
64
96
64
Sometimes there may be no data waiting to be sent on a sectors forward link When theres no data to transmit on a slot, transmitting can be suspended during the data portions of that slot But---the MAC and PILOT must be transmitted!! New and existing mobiles on this sector and surrounding sectors need to monitor the relative strength of all the sectors and decide which one to use next, so they need the pilot Mobiles TRANSMITTING data to the sector on the reverse link need power control bits So MAC and PILOT are always transmitted, even in an empty slot
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 26
PILOT
PILOT
MAC
MAC
MAC
SLOT
DATA
400 chips
DATA
400 chips
DATA
400 chips
MAC
DATA
400 chips
64
96
64
64
96
64
Slot
FRAME
1 Frame = 16 slots 32k chips 26-2/3 ms
1-2005
340 - 27
FRAME
1 Frame = 16 slots 32k chips 26-2/3 ms
CONTROL CHANNEL
16-FRAME
CONTROL CHANNEL CYCLE
16 Frames 524k chips 426-2/3 ms
1-2005
340 - 28
PILOT
PILOT
MAC
MAC
MAC
SLOT
DATA
400 chips
DATA
400 chips
DATA
400 chips
MAC
DATA
400 chips
64
96
64
64
96
64
FRAME
1 Frame = 16 slots 32k chips 26-2/3 ms
CONTROL CHANNEL
16-FRAME
CONTROL CHANNEL CYCLE
16 Frames 524k chips 426-2/3 ms
REVERSE CHANNELS
Long PN offset
ACCESS
MAC
Access
64
DRCLock RPC
MAC
Public or Private
MAC DRC
FORWARD
Walsh code
W0 W4 W1 W5 W816 W2 W6 W3 W7
These channels are NOT CONTINUOUS like IS-95 or 1xRTT! They are made up of SLOTS carrying data subpackets to individual users or control channel subpackets for everyone to monitor Regardless of who owns a SLOT, the slot also carries two small generic bursts containing PILOT and MAC information everyone can monitor
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 30
A TR IC FF
ACK Data
W48 W24
Walsh code
AP
Access terminals watch the Pilot to select the strongest sector and choose burst speeds The Reverse Activity Channel tells ATs If the reverse link loading is too high, requiring rate reduction Each AT with open connection has a MAC channel including DRCLock and RPC (Reverse Power Control) muxed using the same MAC index 5-63. The Control channel carries overhead messages for idle ATs but can also carry user traffic
DRCLock RPC
MAC
MAC
DATA
400 chips
DATA
400 chips
MAC
DATA
400 chips
1-2005
340 - 31
REVERSE CHANNELS
Long PN offset
Access
ACCESS
TRAFFIC
MAC DRC
Public or Private
ACK Data
W48 W24
1-2005
340 - 32
AP
The system notifies a mobile when data for it is waiting to be sent The mobile chooses which sector it hears best at that instant, and requests the sector to send it a packet there are 16 possible transmission formats the mobile may request, called DRC Indices. Each DRC Index value is really a combined specification including specific values for: what data speed will be transmitted how big a chunk of waiting data will be sent (that amount of data will be cut of the front of the waiting data stream and will be the Packet transmitted) what kind of encoding will be done to protect the data (3x Turbo, 5x Turbo, etc.) and the symbol repetition, if any after the symbols are formed, how many SUBpackets they will be divided into Then, the sector starts transmitting the SUBpackets in SLOTS on the forward link The first slot will begin with a header that the mobile will recognize so it can begin the receiving process
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 33
AP
1-2005
340 - 34
AP
1-2005
340 - 35
AP
DRC Modu- Preamble Payload Raw C/I Index Slots lation Chips Bits kb/s db 0x0 n/a QPSK n/a 0 null rate n/a 0x1 16 QPSK 1024 1024 38.4 -11.5 0x2 8 QPSK 512 1024 76.8 -9.2 0x3 4 QPSK 256 1024 153.6 -6.5 0x4 2 QPSK 128 1024 307.2 -3.5 0x5 4 QPSK 128 2048 307.2 -3.5 0x6 1 QPSK 64 1024 614.4 -0.6 0x7 2 QPSK 64 2048 614.4 -0.5 0x8 2 QPSK 64 3072 921.6 +2.2 0x9 1 QPSK 64 2048 1,228.8 +3.9 0xa 2 16QAM 64 4096 1,228.8 +4.0 0xb 1 8PSK 64 3072 1,843.2 +8.0 0xc 1 16QAM 64 4096 2,457.6 +10.3 0xd 2 16QAM 64 5120 1,536.0 in Rev. A 0xe 1 16QAM 64 5120 3,072.0 in Rev. A
1-2005
340 - 36
AP
DRC Modu- Preamble Payload Raw C/I Index Slots lation Chips Bits kb/s db 0x0 n/a QPSK n/a 0 null rate n/a 0x1 16 QPSK 1024 1024 38.4 -11.5 0x2 8 QPSK 512 1024 76.8 -9.2 0x3 4 QPSK 256 1024 153.6 -6.5 0x4 2 QPSK 128 1024 307.2 -3.5 0x5 4 QPSK 128 2048 307.2 -3.5 0x6 1 QPSK 64 1024 614.4 -0.6 0x7 2 QPSK 64 2048 614.4 -0.5 0x8 2 QPSK 64 3072 921.6 +2.2 0x9 1 QPSK 64 2048 1,228.8 +3.9 0xa 2 16QAM 64 4096 1,228.8 +4.0 0xb 1 8PSK 64 3072 1,843.2 +8.0 0xc 1 16QAM 64 4096 2,457.6 +10.3 0xd 2 16QAM 64 5120 1,536.0 in Rev. A 0xe 1 16QAM 64 5120 3,072.0 in Rev. A
Turbo Coder Using the specifications for the mobiles requested DRC + + + + + + D D D index, the correct-size packet + + + of bits is fed into the turbo + + + + D D D coder and the right number of + symbols are created. Symbols
Interleaver
1-2005
340 - 37
AP
DRC Modu- Preamble Payload Raw C/I Index Slots lation Chips Bits kb/s db 0x0 n/a QPSK n/a 0 null rate n/a 0x1 16 QPSK 1024 1024 38.4 -11.5 0x2 8 QPSK 512 1024 76.8 -9.2 0x3 4 QPSK 256 1024 153.6 -6.5 0x4 2 QPSK 128 1024 307.2 -3.5 0x5 4 QPSK 128 2048 307.2 -3.5 0x6 1 QPSK 64 1024 614.4 -0.6 0x7 2 QPSK 64 2048 614.4 -0.5 0x8 2 QPSK 64 3072 921.6 +2.2 0x9 1 QPSK 64 2048 1,228.8 +3.9 0xa 2 16QAM 64 4096 1,228.8 +4.0 0xb 1 8PSK 64 3072 1,843.2 +8.0 0xc 1 16QAM 64 4096 2,457.6 +10.3 0xd 2 16QAM 64 5120 1,536.0 in Rev. A 0xe 1 16QAM 64 5120 3,072.0 in Rev. A
Turbo Coder Using the specifications for the mobiles requested DRC + + + + + + D D D index, the correct-size packet + + + of bits is fed into the turbo + + + + D D D coder and the right number of + symbols are created. Symbols
Interleaver
To guard against bursty errors in transmission, the symbols are completely stirred up in a block interleaver.
Block Interleaver
1-2005
340 - 38
AP
DRC Modu- Preamble Payload Raw C/I Index Slots lation Chips Bits kb/s db 0x0 n/a QPSK n/a 0 null rate n/a 0x1 16 QPSK 1024 1024 38.4 -11.5 0x2 8 QPSK 512 1024 76.8 -9.2 0x3 4 QPSK 256 1024 153.6 -6.5 0x4 2 QPSK 128 1024 307.2 -3.5 0x5 4 QPSK 128 2048 307.2 -3.5 0x6 1 QPSK 64 1024 614.4 -0.6 0x7 2 QPSK 64 2048 614.4 -0.5 0x8 2 QPSK 64 3072 921.6 +2.2 0x9 1 QPSK 64 2048 1,228.8 +3.9 0xa 2 16QAM 64 4096 1,228.8 +4.0 0xb 1 8PSK 64 3072 1,843.2 +8.0 0xc 1 16QAM 64 4096 2,457.6 +10.3 0xd 2 16QAM 64 5120 1,536.0 in Rev. A 0xe 1 16QAM 64 5120 3,072.0 in Rev. A
Turbo Coder Using the specifications for the mobiles requested DRC + + + + + + D D D index, the correct-size packet + + + of bits is fed into the turbo + + + + D D D coder and the right number of + symbols are created. Symbols
Interleaver
To guard against bursty errors in transmission, the symbols are completely stirred up in a block interleaver. The re-ordered stream of symbols is now ready to transmit.
Block Interleaver
Interleaved Symbols
1-2005
340 - 39
AP
DRC Modu- Preamble Payload Raw C/I Index Slots lation Chips Bits kb/s db 0x0 n/a QPSK n/a 0 null rate n/a 0x1 16 QPSK 1024 1024 38.4 -11.5 0x2 8 QPSK 512 1024 76.8 -9.2 0x3 4 QPSK 256 1024 153.6 -6.5 0x4 2 QPSK 128 1024 307.2 -3.5 0x5 4 QPSK 128 2048 307.2 -3.5 0x6 1 QPSK 64 1024 614.4 -0.6 0x7 2 QPSK 64 2048 614.4 -0.5 0x8 2 QPSK 64 3072 921.6 +2.2 0x9 1 QPSK 64 2048 1,228.8 +3.9 0xa 2 16QAM 64 4096 1,228.8 +4.0 0xb 1 8PSK 64 3072 1,843.2 +8.0 0xc 1 16QAM 64 4096 2,457.6 +10.3 0xd 2 16QAM 64 5120 1,536.0 in Rev. A 0xe 1 16QAM 64 5120 3,072.0 in Rev. A
Turbo Coder Using the specifications for the mobiles requested DRC + + + + + + D D D index, the correct-size packet + + + of bits is fed into the turbo + + + + D D D coder and the right number of + symbols are created. Symbols To guard against bursty errors in transmission, the symbols are completely stirred up in Block Interleaver a block interleaver. The re-ordered stream of symbols is now ready to transmit. The symbols are divided into the correct number of subpackets, which Interleaved Symbols will occupy the same number of transmission slots, spaced four apart. Its up to the AP to decide when it will start transmitting the stream, taking into account any other pending subpackets for other users, and proportional fairness.
Interleaver
Subpacket 2
Subpacket 3
1-2005
Subpacket 1
Subpacket 4
340 - 40
AP
DRC Modu- Preamble Payload Raw C/I Index Slots lation Chips Bits kb/s db 0x0 n/a QPSK n/a 0 null rate n/a 0x1 16 QPSK 1024 1024 38.4 -11.5 0x2 8 QPSK 512 1024 76.8 -9.2 0x3 4 QPSK 256 1024 153.6 -6.5 0x4 2 QPSK 128 1024 307.2 -3.5 0x5 4 QPSK 128 2048 307.2 -3.5 0x6 1 QPSK 64 1024 614.4 -0.6 0x7 2 QPSK 64 2048 614.4 -0.5 0x8 2 QPSK 64 3072 921.6 +2.2 0x9 1 QPSK 64 2048 1,228.8 +3.9 0xa 2 16QAM 64 4096 1,228.8 +4.0 0xb 1 8PSK 64 3072 1,843.2 +8.0 0xc 1 16QAM 64 4096 2,457.6 +10.3 0xd 2 16QAM 64 5120 1,536.0 in Rev. A 0xe 1 16QAM 64 5120 3,072.0 in Rev. A
Turbo Coder When the AP is ready, the first + + subpacket is actually + + + + D D D transmitted in a slot. + + + The first subpacket begins with + + + + D D D a preamble carrying the + users MAC index, so the Symbols user knows this is the start of its sequence of subpackets, and how Block Interleaver many subpackets are in the sequence.. The user keeps collecting subpackets until either: 1) it has been able to reverse-turbo decode the Interleaved Symbols packet contents early, or 2) the whole schedule of subpackets has been transmitted.
Interleaver
Subpackets
1
SLOTS
4
340 - 41
1-2005
AP
C I
0 0
Ec Io
Ec/Io, db
-20
-10
+10
+20
-25
-20
-15
-10
-5
10
15
20 0
-0.04 -0.14 -0.17 -0.21 -0.27 -0.33 -0.41 -0.51 -0.64 -0.79 -0.97 -1.19 -1.46 -1.76 -2.12 -2.54 -3.01 -3.54 -4.12 -4.76 -5.46 -6.97 -8.64 -10.41 -12.27
20 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 -1 -2 -3 -4 -6 -8 -10 -12
-5
-10
Ec/Io, db
-15
-20
-25
-30
C/I, db
1-2005
340 - 43
Good Signal!
PACKET PLEASE!
@ x speed DRC
DO-RNC
Access Node (User Terminal)
1-2005
340 - 44
1-2005
340 - 45
Data Packet
Code Symbols
Turbo coding is the default encoding method for 1xEV-DO on both forward and reverse link The code rate is determined by: input bit rate effective turbo coder rate, including number of coder outputs and symbol puncturing The data rate and number of slots used per packet determine the other forward link variables as shown in the table at right
1-2005
Data Total Rate Slots Code (kbps) Used Rate 38.4 16 1/5 76.8 8 1/5 153.6 4 1/5 307.2 2 1/5 614.4 1 1/3 307.2 4 1/3 614.4 2 1/3 1,228.8 8 1/3 921.6 2 1/3 1,843.2 2 1/3 1,228.8 8 1/3 2,457.6 8 1/3
Bits per Packet 1,024 1,024 1,024 1,024 1,024 2,048 2,048 2,048 3,072 3,072 4,096 4,096
Bits/Pkt - Tail Field 1,018 1,018 1,018 1,018 1,018 2,042 2,042 2,042 3,066 3,066 4,090 4,090
Symbols per Packet 5,120 5,120 5,120 5,120 3,072 6,144 6,144 6,144 9,216 9,216 12,288 12,288
340 - 46
IS-95 and 1xRTT use data scrambling on the forward link the scrambling sequence is a decimated version of the long PN code from the previous frame the purpose is to randomize the waveforms of multiple users so that the composite transmitted waveform has a low peak-toaverage ratio and effectively uses power amplifier capability a secondary purpose is to provide enhanced privacy 1xEV-DO uses data scrambling on both links to randomize the data and avoid unbalanced waveforms the scrambling sequence is generic, not unique per user security is already provided in a standard-defined layer the generic scrambling register coefficients are specified in the standard
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 47
MAC
MAC
MAC
DATA
336 chips
DATA
DATA
400 chips
MAC
DATA
64
Data
(modulation symbols)
I Walsh Channels
I Sequence Repetition 0 Q
Preamble
32-symbol bi-Orthogonal MAC cover Signal Point Mapping Signal Point Mapping RPC Channel Gain DRC Lock Channel Gain Signal Point Mapping RA channel gain MAC Index Walsh Cover
Q Walsh Channels
I I Walsh Sequence Chip Level Repetition Summer Q (factor=4) Q Walsh Cover 0 Signal Point Mapping 0 I Q
340 - 48
AP
Each active user on a sector is assigned a unique 7-bit MAC index (64 MACs possible) Each data packet begins with a preamble, using the MAC index of the intended recipient Five values of MAC indices are reserved for multi-user packets packets intended for reception by a group for example, control channels mobiles may have individual MAC indices AND be simultaneously in various groups this trick keeps payload size low even for transmissions to groups
1-2005
0 2 4 6 8 10 12 14 16 18 20 22 24 26 28
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
I I I I I I I I I I I I I I I
32 34 36 38 40 42 44 46 48 50 52 54 56 58 60
16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
I I I I I I I I I I I I I I I
33 35 37 39 41 43 45 47 49 51 53 55 57 59 61
30 15 I
62 31 I
31 47 Q
63 63 Q
340 - 49
AP
1-2005
340 - 51
1-2005
340 - 52
CDMA2000 1xRTT
SYSTEM
Application layer LAC layer MAC layer Physical layer RLP Radio Link Protocol MAC layer Physical layer Application layer LAC layer RLP Radio Link Protocol
Application layer Stream layer Session layer Connection layer Security layer MAC layer Physical layer HARQ protocol
F-FCH R-FCH
In 1xRTT, retransmission protocols typically work at the link layer Radio Link Protocol (RLP) communicates using signaling packets lost data packets arent recognized and are discarded at the decoder This method is slow and wasteful!
1-2005
In 1xEV-DO, RLP functions are replicated at the physical layer HARQ Hybrid Repeat Request Protocol fast physical layer ACK bits Chase Combining of multiple repeats unneeded repeats pre-empted by positive ACK This method is fast and efficient!
340 - 53
1-2005
340 - 54
Data Packet
Physical Layer Packets encoded, interleaved, broken into subpackets each subpacket is a unique coded representation of the packet Each subpacket is sent independently during one slot Subpackets are sent in sequential order with a three-slot gap between successive subpackets
Forward Channel
Packet Subpacket 0 other other other 0 other other other 0 other other other 0 other other other 1 0 pkts pkts pkts. 1 pkts. pkts. pkts. 2 pkts. pkts pkts 3 pkts pkts pkts 0
Traffic
One Slot
The receiver combines successive subpackets until it finally decodes the complete packet contents then sends an ACK to cancel any remaining unneeded subpackets this Hybrid ARQ (HARQ) process gives incremental redundancy
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 55
F-Traffic
AT
R-DRC
1/2 Slot offset
pr e NA par K e pr e NA par K e
de co de co de co de co
R-ACK
One Slot
de
ci d
de
ci d
pr e NA par K e
de
ci d
de
ci d
NAK
NAK
NAK
AT selects sector, sends request for data AP starts sending next packet, one subpacket at a time After each subpacket, AT either NAKs or AKs on ACK channel In this example, AP transmits all 4 scheduled subpackets of packet #0 before the AT is finally able to decode correctly and send AK then the AP can begin packet #1, first subpacket
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 56
pr e NA par K e
de
de
de
de
AK!
F-Traffic
AT
R-DRC
1/2 Slot offset
pr e NA par K e pr e NA par K e
de co de co de co de co
R-ACK
One Slot
de
ci d
de
ci d
pr e NA par K e
de
ci d
de
ci d
NAK
AK!
NAK
AT selects sector, sends request for data AP starts sending next packet, one subpacket at a time After each subpacket, AT either NAKs or AKs on ACK channel In this example, AT is able to successfully decode packet #0 after receiving only the first two subpackets AT sends ACK. AP now continues with first subpacket of packet #1
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 57
pr e NA par K e
de
de
de
de
AK!
Data Packets
Packet 0
Subpackets
Packet 1
Subpackets
Packet 2
Subpackets
Packet 3
Subpackets
Forward Channel
Packet Subpacket
0 0
1. 0
2. 0
3. 0
0 1
1. 1
2. 1
3. 1
0 2
1. 2
2. 2
3. 2
0 3
1. 3
2. 3
3. 3
Traffic
One Slot
Definition: Number of ARQ Instances the maximum number of packets that may be in transit simultaneously sometimes also called the number of ARQ channels This figure and the preceding page appear to show 4 ARQ instances Packets in the different ARQ instances may be for the same user (the most common situation) may be for different users (determined by QOS and scheduling) Destination mobile knows its packets by their preamble
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 58
AP
Stronger than target SNR? SNR target
Reverse RF
TX RF Digital
Access Terminal 1xEV-DO reverse link power control is similar to IS-95/IS-2000 1xEV-DO power control holds the mobile pilot to a constant S/N ratio at the Access Point The DRC, RRI, and ACK channels are also controlled The ideal ratio of reverse pilot to other channels also depends on the reverse data rate Power control bits are sent on the forward MAC channel one bit per slot (thats 600 per second), sent as four symbols -one in each of the MAC periods of that slot
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 59
1-2005
340 - 60
1-2005
340 - 61
1-2005
340 - 62
Rate Constraints
The access terminal shall select a transmission rate that satisfies the following constraints: The access terminal shall transmit at a rate that is no greater than the value of MaxRate. The access terminal shall transmit at a rate that is no greater than the value of CurrentRateLimit. The access terminal shall transmit at a data rate no higher than the highest data rate that can be accommodated by the available transmit power. The access terminal shall not select a data rate for which the minimum payload length, as specified in Table 11.8.6-1, is greater than the size of data it has to send.
1-2005
340 - 63
1-2005
340 - 64
1-2005
340 - 65
1-2005
340 - 66
1-2005
340 - 67
1-2005
340 - 68
REVERSE LINK
Effective Rate kbps after: 4 slots 8 slots 12 slots 16 slots 19.2 9.6 6.4 4.8 38 19.2 12.8 9.6 76 38.4 25.6 19.2 115 57.6 38.4 28.8 153 76.8 51.2 38.4 230 115 76.8 57.6 307 153 102.4 76.8 461 230 153.6 115.2 614 307 204.8 153.6 921 461 307 230.4 1228 614 409 307.2 1843 921 614 460.8 Code Rate (repetition) after 4 slots 8 slots 12 slots 16 slots 1/5 1/5 1/5 1/5 1/5 1/5 1/5 1/5 1/4 1/5 1/5 1/5 3/8 1/5 1/5 1/5 1/2 1/4 1/5 1/5 3/8 1/5 1/5 1/5 1/2 1/4 1/5 1/5 3/8 1/5 1/5 1/5 1/2 1/4 1/5 1/5 1/2 1/4 1/5 1/5 2/3 1/3 2/9 1/5 2/3 1/3 1/3 1/3
The 1xEV-DO Rev. A reverse link has seven available modes offering higher speeds than available in Rev. 0 Modulation formats are hybrids defined in the standard The 1xEV-DO Rev. A forward has two available modes offering higher speeds than available in Rev. 0.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 69
Basic Access Terminal Basic Access Terminal Architecture and Operation Architecture and Operation
1-2005
340 - 70
Chips
control
Traffic Correlator PN xxx Walsh xx Receiver RF Section IF, Detector AGC RF Duplexer RF Open Loop Traffic Correlator PN xxx Walsh xx Traffic Correlator PN xxx Walsh xx Pilot Searcher PN xxx Walsh 0
bits
Symbols
power
Packets
UART Conv or Turbo Coder
Messages
CPU
Transmit Gain Adjust Messages Transmitter Digital Section Long Code Gen.
Course Series 340v3.2 (c)2005 Scott Baxter
Transmitter RF Section
1-2005
340 - 71
Access Terminal
Rake Receiver PN Walsh PN RF PN PN Walsh Walsh Walsh Pilot Ec/Io
user data
AP AP
Searcher PN W=0
Burst by burst, the Access Terminal asks for transmission from whichever Active sector it hears best, at the max speed it can successfully use Using latest multipath data from its pilot searcher, the Access Terminal uses the combined outputs of the four traffic correlators (rake fingers) Each rake finger can be set to match any multipath component of the signal The terminal may be a dual-mode device also capable of 1xRTT voice/data fingers could even be targeted on different AP, but in 1xEV-DO mode only a single AP transmits to us, never more than one at a time, so this capability isnt needed or helpful in 1xEV-DO mode
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 72
Access Terminal
Rake Receiver PN Walsh PN RF PN PN Walsh Walsh Walsh Pilot Ec/Io
user data
AP
AP
Searcher PN W=0
The AT uses the Route Update protocol to frequently update its preferences of which sectors it wants in its active set Frame-by-frame, all the sectors in the Active Set listen for the ATs signal Each sector collects what it heard from the AT, and sends it back to the DO-RNC. The DO-RNC uses the cleanest (lowest number of errors) packet
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 73
DO-RNC
Sel.
AP AP
? ?
PN RF PN PN
user data
Searcher PN W=0
Pilot Ec/Io
1xEV-DO Route Update is driven by the Access Terminal Access Terminal continuously checks available pilots Access Terminal tells system pilots it currently sees System puts those sectors in the active set, tells Access Terminal Access terminal requests data bursts from the sector it likes best tells which sector and what burst speed using the DRC channel so there is no Soft Handoff on the forward link, just fast choices All sectors in Active Set try to hear AT, forward packets to the DO-RNC so the reverse link does benefit from CDMA soft handoff
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 74
AT must support
1-2005
340 - 76
1-2005
340 - 77
PSTN
t1
t1
SEL
t1
CE
BTS
The first commercial IS-95 CDMA systems provided only circuitswitched voice calls
1-2005
340 - 78
Internet VPNs
PDSN Home Agent
AAA
Switch
(C)BSC/Access Manager
PSTN
t1
t1
SEL
t1
CE
BTS
CDMA2000 1xRTT networks added two new capabilities: channel elements able to generate and carry independent streams of symbols on the I and Q channels of the QPSK RF signal this roughly doubles capacity compared to IS-95 a separate IP network implementing packet connections from the mobile through to the outside internet including Packet Data Serving Nodes (PDSNs) and a dedicated direct data connection (the Packet-Radio Interface) to the heart of the BSC The overall connection speed was still limited by the 1xRTT air interface
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 79
Internet VPNs
PDSN Home Agent
DO-OMC
AAA
Switch
CE
PSTN
t1
t1
SEL
t1
CE
BTS
1xEV-DO requires faster resource management than 1x BSCs can give this is provided by the new Data Only Radio Network Controller (DO-RNC) A new controller and packet controller software are needed in the BTS to manage the radio resources for EV sessions in some cases dedicated channel elements and even dedicated backhaul is used for the EV-DO traffic The new DO-OMC administers the DO-RNC and BTS PCF addition Existing PDSNs and backbone network are used with minor upgrading The following sections show Lucent, Motorola, and Nortels specific solutions
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 80
1-2005
340 - 81
T-1/E-1 Ethernet RF
AAA Server Downlink Input Router
Router
AP
AP
Internet
A Lucent 1xEV-DO Radio Access Network (RAN) includes 1xEV-DO base stations and the 1xEV-DO Flexent Mobility Server (FMS). The 1xEV-DO equipment may be collocated with IS-95 and/or 1xRTT equipment, creating 1xEV-DO/IS-95 and 1xEVDO/3G-1X combination base stations.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 82
T-1/E-1 Ethernet RF
AAA Server Downlink Input Router
Router
AP
AP
Internet
The PDSN maintains the link layer to the AT it terminates the PPP link protocol with mobile it serves as the Foreign Agent for Mobile IP functionality The AAA server does authentication, authorization, and accounting it authenticates terminal equipment users when they establish connections it stores and forwards billing information of customers data usage
1-2005
340 - 83
1-2005
340 - 84
1-2005
340 - 85
FMS
ECP
1-2005
1-2005
340 - 87
1-2005
340 - 88
OMC-IP
OMC-R
Elements Existing IS-95 New 1xEV-DO Shared IS-95/DO
HAs
New 1xEV-DO carrier appears as a standard carrier addition to existing network elements new MCC-DO cards and OMC-R database revisions needed AAA and PDSN need software upgrades
1-2005
340 - 89
OMC-IP
OMC-R
Elements Existing IS-95 New 1xEV-DO Shared IS-95/DO
HAs
MCC-DO (Multi-Channel Controller - Data Only) AN-DO (Access Node - Data only) CR (Consolidation Router) Similar in function to the 1x-AN MGX LSW (Layer 3 Switch) Similar in function to the 1x-AN CATs BSC-DO (Base Station Controller-Data Only) Mobility functions like 1x MM - Packet Control & Selection like SDU OMC-DO (Operations & Maintenance Center - Data Only) LMT (Local Maintenance Terminal)
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 90
BSC-DO
MCC-DO AN-DO
IS-2000 1xEV-DO Tool LMF LMT BTS frame & CCP shelf LPA BBX-1X BTS MCC-1X MCC-DO GLI (Traffic) GLI (Control) AN (MGX8800) CR AN AN (Catalyst 6509) LSW BSC CBSC BSC-DO OMC-R O&M OMC-DO UNO PDSN (Note 1) IP Network Telephone Network MSC/HLR Not Required Data Network Not Required AAA
BTS
1x BBX RF Front End 1x Modems DO BBX
CR
LSW
PDSN
T1 or E1
MCCDO
OMC-DO
AN-AAA
1-2005
340 - 91
BTS
1x BBX RF Front End 1x Modems DO BBX
MCC-DO
AN-DO
BTS
1x BBX RF Front End 1x Modems DO BBX
CR
LSW
PDSN
T1 or E1
MCC-DO
OMC-DO
AN-AAA
1xEV-DO Modem 1 carrier, 3 sectors per MCC-DO card Supports 59 channels per sector Span Interface Up to 3 Active Span lines per MCC-DO Most operators will generally deploy with 2 spans per BTS BTS provides control: SCAP messaging Redundant BBX Selection Enhanced BBX interface
MCC- DO
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 92
MCC-DO
BSCDO
AN-DO
BTS
1x BBX RF Front End 1x Modems DO BBX
CR
LSW
PDSN
T1 or E1
MCC-DO
OMC-DO
AN-AAA
CR
LSW
Consolidation Router (CR) Performs span aggregation for DO access points Similar to 1x MGX 1 2 CR frames per BSC-DO Layer 3 Switch (LSW) Performs IP transport across DO Core Network Similar to 1x CAT Two CAT4006 Cages per frame 1 LSW frame will serve all 1xEV-DO frames in a typical MTSO
1-2005
340 - 93
BTS
1x BBX RF Front End 1x Modems DO BBX
MCC-DO
AN-DO
BTS
1x BBX RF Front End 1x Modems DO BBX
CR
LSW
PDSN
T1 or E1
MCC-DO
OMC-DO
AN-AAA
BSC Functionality: RF-scheduling, channel, connection, mobility management, security Access Network Control Radio Resource Management Connection Control Access control / Collision control Handoff control Packet Control and Session Control Transmission of packet data between MCC-DO and PDSN Packet Data Control PDSN selection Provides Authentication information to AAA Management of Data Session Support up to 80 MCC-DO cards per a BSC-DO 1 OMC-DO per each BSC-DO
1-2005
340 - 94
BSC-DO
MCC-DO
AN-DO
CR LSW
PDSN
BTS
1x BBX RF Front End 1x Modems DO BBX
T1 or E1
MCC-DO
OMC-DO
AN-AAA
DO network element manager Manages BSC-DO and MCCDO Ethernet interface to BSCDO Supports network management applications (fault, alarm, performance, configuration) 1-2005
OMC-DO provides GUI based O&M functions Status Management Fault Management Configuration Management Software Management System Parameter Management Performance Monitoring CDL collection Diagnostic & System Test Logging Health Check
340 - 95
1-2005
340 - 96
1-2005
340 - 97
1-2005
340 - 98
1-2005
340 - 99
1-2005
340 - 100
Key Feature small size, fits in any corner Configurations 1-3 Carrier OMNI Expandable to 3 sectors Single carrier high power Power source + 24VDC available Standard Metro Cell modules
24 (0.61m)
1-2005
340 - 102
1-2005
340 - 103
TN-1X
STM-1
340 - 106
1-2005
340 - 109
1-2005
340 - 110
1-2005
340 - 111
1-2005
340 - 113
GPSTM
Cable Trough
GPSTM
Cable Trough
The Univity CDMA Base Station Controller CBRS is a scalable and cost reduced IP enabled Base Station Controller Eliminates the need for separate BIU and CIS cabinets in the BSC for 1xEV-DO nonMTX systems Key Features: Scalable from very low to very high capacity through module additions Multiple frames deployed for configuration flexibility
7
Cable Trough
CP3 - Control Processor (NTHR06CA) Optional - 2nd Enhanced BSC Frame Connectivity
8 9 1 0 1 1 1 2 1 3 1 4 1 5
Cable Trough
Cable Consolidation and Multiplexing Chassis (NTPB13AA) GPSTM - Global Positioning Satellite Timing Module (NTPB15AA)
1-2005
340 - 114
1-2005
340 - 115
BI
No no t R vo eq no i c ui vo e u red co se ! de rs, rs
1-2005
340 - 116
1-2005
340 - 118
Document Number
411-2133-012
Revision
1.11
1 1
411-2133-109 411-2133-126
1.09 1.1
1 1 1 1
1 1 1
1 1 1
Document Title CDMA2000 1xEV-DO System Overview Guide CDMA2000 1xEV-DO NBSS Delta MOs, Logs, OMs and Alarms Reference Manual CDMA2000 1xEV-DO Element Management Subsystem (EMS) Recovery and Upgrade Guide CDMA2000 1xEV-DO Element Management Subsystem (DO-EMS) Administrator's Guide 1xEV-DO D O-RNC Administration Guide CDMA2000 1xEV-DO Configuration Parameters Reference Guide 1xEV-DO Data Only Module (DOM) User Guide CDMA2000 1xEV-DO OMs and Performance Measurement Reference Guide CDMA2000 1xEV-DO Command Line Interface (CLI) Reference Guide CDMA2000 1xEV-DO Logging Message Reference Guide CDMA2000 1xEV-DO Element Management Subsystem (DO-EMS) User Guide 1xEV-DO Script Tool User Guide 1xEV-DO Deployment Guide CDMA Metro Cell Deployment Guidelines Reference Manual
1.00
411-2133-111
04.06
1-2005
340 - 119
1-2005
340 - 120
1xEV-DO/1xRTT Interoperability
The CDMA2000 1xEV-DO Standard IS-856 makes no provision for any kind of handoff to or from any other technology Driven by Operator interest, a Hybrid mode has been developed to provide some types of handoff functions to the best extent possible Hybrid Mode is a mobile only function neither the EV nor 1xRTT network knows anything about it is a proprietary feature with vendor-specific implementation has no standard-defined RF triggers; no hooks In the 1xEV rev. A standard, some new features will be provided the 1xEV control channel will be able to carry 1xRTT pages too this and other changes may make the hybrid mode unnecessary and obsolete
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 121
1-2005
340 - 122
DO systems will be Implemented in Several Configurations 1:1 overlays in busy core areas 1:1 or 1:N overlays in less dense areas Many EV>1x and 1x>EV transition events may occur as a user transitions from area to area Initial system acquisition is also involved as a user activates their AT in different locations These transitions are dependent on the Hybrid mode implementation in the AT The following pages show some possible transitions assuming Mobile IP and AT Hybrid Mode are implemented
1-2005
340 - 123
1xEV-DO Idle
1xEV-DO Active
Idle Mode
1xRTT Active
1-2005
340 - 124
A dual-mode 1xRTT/1xEV-DO mobile using slotted-mode paging can effectively watch the paging channels of both 1xRTT and 1xEV-DO at the same time How is it possible for the mobile to monitor both at the same time? The paging timeslots of the two technologies are staggered Three of the 16 timeslots in 1xRTT conflict with the control channel slots of 1xEV-DO However, conflicts can be avoided by page repetition, a standard feature in systems of both technologies
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 125
1xRTT Idle
After entering this state, the mobile will not search for 1xEV service again Voice Page! Idle Mode Release
1xRTT Active
1-2005
340 - 126
Triggers:
1xEV-DO Idle
Idle Mode
Hybrid Mode
Acquire 1xRTT System driven by PRL Register with 1xRTT Network
Hybrid Mode
Voice Page! Idle Mode
Hybrid Mode
Idle Mode
1xRTT Idle
Idle Mode
Idle Mode
Release
1xRTT Active
1-2005
340 - 127
Fade
1xEV-DO Active
AT data ready
Close Connection
Fade
1xEV-DO Idle
Same DO Subnet?
1xRTT Idle
Idle Mode
Dormant /Idle
1xRTT Active
Reestablish Call
Transfer Finished
1-2005
340 - 128
Fade
1xEV-DO Active
Close Connection
1xEV Traffic
Fade
1xEV-DO Idle
Idle Mode
Idle Mode
Hybrid Mode
Fade
Idle Mode Use 1x PRL, Search for 1xRTT Use 1x PRL, Search for 1xRTT
No Signal Found!!
1xRTT Idle
Idle Mode
Lost Signal!!
No Signal Found!!
1xRTT Active
1-2005
340 - 129
1xEV-DO Active
Coverage Edge
Fade
1xEV-DO Idle
Idle Mode
No Signal Found!!
DO PRL, DO Available?
No Signal Found!!
DO PRL, DO Available?
No Signal Found!!
DO PRL, DO Available?
Idle Mode
Hybrid Mode
Idle Mode
1xRTT Idle
Idle Mode
Idle Mode
1xRTT Active
1-2005
340 - 130
1-2005
340 - 131
cdma2000 to HRPD Dormant Packet Data Session Handoff - Existing HRPD Session
1-2005
340 - 132
cdma2000 to HRPD Dormant Packet Data Session Handoff - Existing HRPD Session
a. The change of AN is indicated by the Location Update procedures as defined in [10]. b. The target AN sends an A9-Setup-A8 message, with Data Ready Indicator set to 0, to the target PCF and starts timer TA8-setup. The handoff indicator of the A9 Indicators IE shall be set to 0. c. If the PDSN address is not available to the target PCF by other means, the target PCF selects a PDSN for this connection using the PDSN selection algorithm as specified in [10]. The target PCF sends an A11-Registration Request message to the PDSN. The A11-Registration Request message includes the MEI within the CVSE and the PANID and CANID within the NVSE. The target PCF starts timer Tregreq. d. The A11-Registration Request message is validated and the PDSN accepts the connection by returning an A11-Registration Reply message with an accept indication and the Lifetime set to the configured Trp value. If the PDSN has data to send, it includes the Data Available Indicator within the CVSE. The A10 connection binding information at the PDSN is updated to point to the target PCF. The target PCF stops timer Tregreq. e. The PDSN initiates closure of the A10 connection with the source BSC/PCF by sending an A11-Registration Update message. The PDSN starts timer Tregupd. f. The source BSC/PCF responds with an A11-Registration Acknowledge message. The PDSN stops timer Tregupd. g. The source BSC/PCF sends an A11-Registration Request message with Lifetime set to zero, to the PDSN. The source BSC/PCF starts timer Tregreq. h. The PDSN sends an A11-Registration Reply message to the source BSC/PCF. The source BSC/PCF closes the A10 connection for the MS/AT and stops timer Tregreq. i. The target PCF responds to the target AN with an A9-Release-A8 Complete message. The target AN stops timer TA8-setup. Note that this step can occur any time after step d.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 133
cdma2000 to HRPD Dormant Packet Data Session Handoff - New HRPD Session
1-2005
340 - 134
cdma2000 to HRPD Dormant Packet Data Session Handoff - New HRPD Session
a. The AT and the target AN initiate HRPD session establishment. During this procedure, the target AN does not receive a UATI for an existing HRPD session. Since no HRPD session exists between the MS/AT and target AN/PCF, an HRPD session is established where protocols and protocol configurations are negotiated, stored and used for communications between the MS/AT and the target AN. Refer to [10], Section 5, Session Layer. b. The AT indicates that it is ready to exchange data on the access stream (e.g., the flow control protocol for the default packet application bound to the target AN is in the open state). c. After HRPD session configuration the MS/AT initiates PPP and LCP negotiations for access authentication. Refer to [19]. d. The target AN/PCF generates a random challenge and sends it to the MS/AT in a CHAP Challenge message in accordance with [22]. e. When the target AN/PCF receives the CHAP response message from the MS/AT, it sends an Access-Request message on the A12 interface to the target AN-AAA which acts as a RADIUS server in accordance with [25]. f. The target AN-AAA looks up a password based on the User-name attribute in the Access-Request message and if the access authentication passes (as specified in [22] and [25]), the target AN-AAA sends an Access-Accept message on the A12 interface in accordance with [25] (RADIUS). The Access-Accept message contains a RADIUS attribute with Type set to 20 (Callback-Id), which is set to the MN ID of the AT. Refer to Section 2.3.2, AN-AAA Support. g. The target AN/PCF returns an indication of CHAP access authentication success to the MS/AT. Refer to [22]. h. If the target AN supports the Location Update procedure, the target AN updates the ANID in the AT using the Location Update procedure. The target AN may also retrieve the PANID from the AT if necessary. This step may occur any time after step a. i. The AT indicates that it is ready to exchange data on the service stream. (E.g., the flow control protocol for the default packet application bound to the packet data network is in the open state). j. The target AN/PCF sends an A11-Registration Request message to the PDSN. The A11-Registration Request message includes the MEI within the CVSE and the PANID and the CANID within the NVSE. If PANID is not sent in step h, the target AN/PCF sets the PANID field to zero and the CANID field to its own ANID. The target AN/PCF starts timer Tregreq. k. The A11-Registration Request message is validated and the PDSN accepts the connection by returning an A11Registration Reply message with an accept indication and Lifetime set to the configured Trp value. If the PDSN has data to send, it includes the Data Available Indicator within the CVSE. The A10 connection binding information at the PDSN is updated to point to the target AN/PCF. The target AN/PCF stops timer Tregreq. l. The PDSN initiates closure of the A10 connection with the source BSC/PCF by sending an A11-Registration Update message. The PDSN starts timer Tregupd. m. The source BSC/PCF responds with an A11-Registration Acknowledge message. The PDSN stops timer Tregupd. n. The source BSC/PCF sends an A11-Registration Request message with Lifetime set to zero, to the PDSN. The source BSC/PCF starts timer Tregreq. o. The PDSN sends an A11-Registration Reply message to the source BSC/PCF. The source BSC/PCF closes the A10 connection for the MS/AT and stops timer Tregreq.
1-2005
340 - 135
1-2005
340 - 136
MS/AT Terminated Voice Call During Active HRPD Data Packet (Intra-PDSN/Inter-PCF)
1-2005
340 - 138
MS/AT Terminated Voice Call During Active HRPD Data Packet (Intra-PDSN/Inter-PCF)
a. The BS sends a Page Message containing the MS/AT address over the paging channel. The MS/AT may ignore this Page Message to continue the HRPD session. If the MS/AT ignores the message, the following steps are not performed. b. The AN determines that it is not receiving any transmissions from the MS/AT and starts timer Tairdrop. c. The AN sends an A9-AL Disconnected message to PCF2 to stop data flow and starts timer Tald9. d. Upon receipt of the A9-AL Disconnected message, PCF2 sends an A9-AL Disconnected Ack to the AN. The AN stops timer Tald9. e. The MS/AT sends a Page Response message to the BS. This step can occur any time after step c. f. The BS establishes a traffic channel. g. The BS sends an Alert with Info message to instruct the MS/AT to ring. h. The MS/AT and the cdma2000 system set up the data session for handoff from HRPD as a concurrent call service if the MS/AT supports the concurrent call service capability and selects to handoff the data session from the HRPD to the cdma2000 system. Refer to [11], Section 2.17.2.1 steps (a) to step (g). i. The BS sends an A9-Setup-A8 message to PCF1 to establish the A8 connection and starts timer TA8-setup. If the MS/AT has indicated the presence of data ready to send, the BS shall set the Data Ready Indicator to 1; otherwise, the BS shall set the Data Ready Indicator to 0. j. PCF1 sends an A11-Registration Request message to the PDSN to establish the A10 connection to handoff from the HRPD system to the cdma2000 system. PCF1 starts timer Tregreq. k. The A11-Registration Request message is validated and the PDSN accepts the connection by returning an A11Registration Reply message with an accept indication. PCF1 stops timer Tregreq. l. PCF1 sends an A9-Connect-A8 message after the completion of the A10 connection handoff. The BS stops timer TA8setup. m. At this point, the data session is successfully handed off from the HRPD to the cdma2000 system. n. The MS/AT sends a Connect Order message when the call is answered at the MS/AT. o. PDSN Initiates closure of the A10 connection with PCF2 by sending an A11-Registartion Update message. PDSN starts timer Tregupd. This step may occur direct after step j. p. PCF2 responds with an A11-Registartion Acknowledge message. The PDSN stops timer Tregupd. q. PCF2 sends an A11-Registration Request message with Lifetime set to zero, to the PDSN. PCF2 starts timer Tregreq. r. The PDSN sends an A11-Registration Reply message to PCF2. PCF2 closes the A10 connection for the MS/AT and stops timer Tregreq. s. Upon not having received any transmissions from the MS/AT prior to timer Tairdrop expiration, the AN sends an A9Release-A8 message to PCF2 and starts timer Trel9. This step can occur any time after step b. t. PCF2 responds to the AN with an A9-Release-A8 Complete message. The AN stops timer Trel9.
1-2005
340 - 139
1-2005
340 - 140
MS/AT Terminated Voice Call During Active HRPD Packet Data Session (Intra-PCF)
1-2005
340 - 142
MS/AT Terminated Voice Call During Active HRPD Packet Data Session (Intra-PCF)
a. The BS sends a Page Message containing the MS/AT address over the paging channel. The MS/AT may ignore this Page Message to continue the HRPD session. If the MS/AT ignores the message, the following steps are not performed. b. The AN determines that it is not receiving any transmissions from the MS/AT and starts timer Tairdrop. c. The AN sends an A9-AL Disconnected message to the PCF to stop data flow and starts timer Tald9. d. Upon receipt of the A9-AL Disconnected message, the PCF sends an A9-AL Disconnected Ack to the AN. The AN stops timer Tald9. e. The MS/AT sends a Page Response message to the BS. This step can occur any time after step c. f. The BS establishes a traffic channel. g. The BS sends an Alert with Info message to instruct the MS/AT to ring. h. The MS/AT and cdma2000 system set up the data session for handoff from HRPD as a concurrent call service if the MS/AT supports the concurrent call service capability and selects to handoff the data session from the HRPD to the cdma2000 system. Refer to [11], Section 2.17.2.1 steps (a) to step 3(g). i. The BS sends an A9-Setup-A8 message to the PCF to establish the A8 connection and starts timer TA8-setup. If the MS/AT has indicated the presence of data ready to send, the BS shall set the Data Ready Indicator to 1; otherwise, the BS shall set the Data Ready Indicator to 0. j. The PCF sends an A9-Connect-A8 message to the BS. The BS stops timer TA8-setup. k. At this point, the data session is successfully handed off from the HRPD system to the cdma2000 system. l. The MS/AT sends a Connect Order message when the call is answered at the MS/AT. m. Upon not having received any transmissions from the MS/AT prior to timer Tairdrop expiration, the AN sends an A9-Release-A8 message to the PCF and starts timer Trel9. n. Upon receipt of the A9-Release-A8 message, the PCF sends an A9-Release-A8 Complete message to the AN. The AN stops timer Trel9.
1-2005
340 - 143
cdma2000 to HRPD Active Packet Data Session Handoff Status Management Supported by Feature Invocation
1-2005
340 - 144
cdma2000 to HRPD Active Packet Data Session Handoff Status Management Supported by Feature Invocation
a. The MS/AT sends an Origination Message, including the feature code as the called number, to the BS when the MS/AT starts the HRPD communication. This feature code indicates that the MSC should activate a feature (e.g., do not disturb). b. The BS and the MSC setup the call. From the feature code, the MSC knows not to page the MS/AT for a voice call. Refer to [11], Section 2.2.2.1, Mobile Origination. c. The BS and the MSC clear the call. Refer to [11], Section 2.3.5.3, Call Clear Initiated by MSC. d. The MS/AT starts communication on the HRPD session. Refer to Section 3.3.2, AT Initiated Call Re-activation from Dormant State (Existing HRPD Session). e. The MS/AT terminates communication on the HRPD session when the HRPD session goes dormant or inactive. Refer to Section 3.5.2, HRPD Session Release - Initiated by the AT (No Connection Established). f. The MS/AT sends an Origination Message, including the feature code as the calling number, to the BS when the MS/AT ends the HRPD communication. This feature code indicates that the MSC should deactivate the feature activated in step a. g. The BS and the MSC setup the call. From the feature code, the MSC know it may page the MS/AT for a voice call. Refer to [11], Section 2.2.2.1, Mobile Origination. h. The BS and the MSC clear the call. Refer to [11], Section 2.3.5.3, Call Clear Initiated by MSC.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 145
An Introduction to the An Introduction to the IS-856 Standard for 1xEV-DO IS-856 Standard for 1xEV-DO
1-2005
340 - 146
IS-856 defines the behavior of Interface Sector three main entities: Access Access Network Terminal Access Terminal Air Interface Protocol Architecture Access Network IS-856 Layer Protocol & Function Chapter The behavior of the system is 2 Application Default Signaling Application defined in layers Default Packet Application 3 Stream 0: Default Signaling the layers provide a Stream 4 Stream 1, 2, 3: not used by default simple, logical foundation Negotiation for performing functions Session Protocol Configuration Address Mgt. 5 Protocol State Mtce. and applications Connection Air Link Connection Establishment 6 Air Link Connection Maintenance Specific applications, functions and protocols Security Authentication 7 Encryption exist in each layer Defines procedures to transmit Each layer is defined in Mac 8 and receive over the physical layer specific chapters of the Physical Channel Structure Modulation. 9 standard Frequency, Power Encoding.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 147
Air
Application
layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Stream
layer
Session
layer
Connection
layer
Security
layer
Mac
layer
Physical
layer
1-2005
340 - 148
Channels and Layer-3 Messages Channels and Layer-3 Messages in 1xEV-DO Call Processing in 1xEV-DO Call Processing
1-2005
340 - 149
MESSAGE ID 8 MESSAGE SEQUENCE 8 CHANNEL INCLUDED 1 CHANNEL 0 or 24 FRAME OFFSET 4 DRC LENGTH 2 DRC CHANNEL GAIN 6 ACK CHANNEL GAIN 6 NUM PILOTS 4 NUMPILOTS occurrences of this block: PILOT PN 9 SOFTER HANDOFF 1 MAC INDEX 6 DRC COVER 3 RAB LENGTH 2 RAB OFFSET 3
1-2005
340 - 150
Pilot Channel
No Messages
Control Channel
ACAck Access Parameters Broadcast Reverse Rate Limit Connection Deny Data Ready Hardware ID Request Keep Alive Request Keep Alive Response Location Request Location Assignment Redirect Session Close Sync SectorParameters Page Quick Config Xoff Response Xon Response Traffic Channel Assignment UATI Assignment
Access Channel
Connection Request Data Ready ACK Hardware ID Response Keep Alive Request Keep Alive Response Location Complete Location Notification Route Update Session Close UATI Request UATI Complete Xoff Request Xon Request
1-2005
340 - 151
1-2005
340 - 152
Sent on Channels ID Inst. CC Syn SS AC FTC ACAck 0x00 1 CC Access Parameters 0x01 1 CC ANKey Complete 0x02 1 FTC ATKey Complete 0x03 1 Attribute Override 0x05 1 FTC Attribute Override Response 0x06 1 Broadcast Reverse Rate Limit 0x01 1 CC Configuration Complete 0x00 1 FTC Configuration Request 0x50 24 FTC Configuration Response 0x51 24 FTC Configuration Start 0x01 1 FTC ConnectionClose 0x00 1 FTC ConnectionDeny 0x02 1 CC ConnectionRequest 0x01 1 AC DataReady 0x0b 1 CC FTC DataReadyACK 0x0c 1 AC Fixed Mode Enable 0x00 1 Fixed Mode X off 0x01 1 Hardware ID Request 0x03 2 CC FTC Hardware ID Response 0x04 1 AC Keep Alive Request 0x02 1 CC AC FTC Keep Alive Response 0x03 1 CC AC FTC Key Request 0x00 1 FTC Key Response 0x01 1 Location Assignment 0x05 1 CC FTC Location Complete 0x06 1 AC Location Request 0x03 1 CC FTC Location Notification 0x04 1 AC Nak 0x00 1 FTC Neighbor List 0x00 1 FTC Page 0x00 1 SS Quick Config 0x00 1 SS Redirect 0x00 1 CC FTC Reset 0x00 2 FTC Reset ACK 0x01 2 FTC Reset Report 0x03 1 FTC Route Update 0x00 1 AC RTCAck 0x00 1 FTC SectorParameters 0x01 1 CC SYN SS Session Close 0x01 1 CC AC FTC Sync '00' 1 CC SYN SS Traffic Channel Assignment 0x01 1 CC FTC Traffic Channel Complete 0x02 1 UATI Assignment 0x01 1 CC FTC UATI Complete 0x02 1 AC UATI Request 0x00 1 AC Unicast Reverse Rate Limit 0x02 1 FTC Xoff Request 0x09 1 AC Xoff Response 0x0a 1 CC FTC Xon Request 0x07 1 AC Xon Response 0x08 1 CC FTC
Message Name
RTC
RTC RTC RTC RTC RTC RTC RTC RTC RTC RTC
RTC
RTC RTC
RTC RTC
1-2005
SLP Best Effort Best Effort Reliable Reliable Best Effort Best Effort Best Effort Reliable Reliable Reliable Best Effort Best Effort Best Effort Best Effort Best Effort Best Effort Best Effort Best Effort Best Effort Rel, Best Eff Best Effort Best Effort Reliable Reliable Best Effort Rel, Best Eff Best Effort Rel, Best Eff Best Effort Reliable Best Effort Best Effort Best Effort Best Effort Best Effort Reliable Rel, Best Eff Reliable Best Effort Best Effort Best Effort Rel, Best Eff Reliable Best Effort Rel, Best Eff Best Effort Reliable Best Effort Best Effort Best Effort Best Effort
Addressing Unicast Broadcast Unicast Unicast Unicast Unicast Broadcast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Broadcast Bcst, Unicst Unicast Unicast Unicast Unicast Unicast Broadcast Unicast Broadcast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast Unicast
Pri. 10 30 40 40 40 40 40 40 40 40 40 40 40 40 40 40 40 40 40 40 40 40 40 40 40 40 40 40 50 40 20 10 40 40 40 40 20 10 30 40 30 20 40 10 10 10 40 40 40 40 40
Header
Payload
Packet
Packet
Payload
Header
Payload
Pad
Header
Payload
Trailer
Header
Payload
Trailer
Header
Payload
Trailer
Header
Payload
Trailer
MAC Layer
MAC Header
MAC Payload
MAC Trailer
Physical Layer
1-2005
340 - 154
Appendix: Protocols of the Appendix: Protocols of the IS-856 1xEV-DO Standard IS-856 1xEV-DO Standard
1-2005
340 - 155
1-2005
340 - 156
Page 2 of 2
1-2005
340 - 157
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
The following section shows basic information on each layer in the IS-856 protocol stack Most protocols are briefly described along with fundamental details of their states and operation Weve tried to take the shalls and shoulds of legal standard-talk out of the way so you can dig in and understand whats really happening, and why For deeper information, of course you can always go to the appropriate chapter of the current version of the IS-856 standard, and/or to your network manufacturers documentation
never drive or operate heavy machinery while reading the CDMA standards
1-2005
340 - 158
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
The transmission unit of the physical layer is a physical layer packet. A physical layer packet can be 256, 512, 1024, 2048, 3072, or 4096 bits long. The format of the physical layer packet is different on the different channels. A physical layer packet can carry one or more MAC layer packets. Physical Layer Packet Formats A Control Channel physical layer packet is 1024 bits long. Control Channel physical layer packets carry one MAC layer packet each. Control Channel physical layer packets use the format below: MAC Layer Packet from the Control Channel MAC protocol. FCS - Frame check sequence (explained in 9.1.4). TAIL - Encoder tail bits. This field is set to all 0s.
1-2005
340 - 159
1-2005
340 - 160
Forward Traffic Channel physical layer packets can be 1024, 2048, 3072, or 4096 bits long. A Forward Traffic Channel physical layer packet can carry 1, 2, 3, or 4 Forward Traffic Channel MAC layer packets, determined by the date rate. The format for Forward Traffic Channel physical layer packets is above.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 161
1-2005
340 - 162
Data Rate 4.8 9.6 19.2 38.4 76.8 153.6 Kbps Reverse Rate Index 1 2 3 4 5 6 Encoder Packet Size 256 512 1024 2048 4096 8192 bits Packet Duration 53.33 53.33 53.33 53.33 53.33 53.33 ms Overall Code Rate 0.25 0.25 0.25 0.25 0.25 0.5 Bits/sym Code Symbols/ Code 1024 2048 4096 8192 16384 16384 Symbols Packet Code Symbol Rate 19.2 38.4 76.8 153.6 307.2 307.2 Ksps Interleaved Packet 16 8 4 2 1 1 Repeats Mod. Symbol Rate 307.2 307.2 307.2 307.2 307.2 307.2 Ksps Data Modulation BPSK BPSK BPSK BPSK BPSK BPSK PN Chips per PN Chips 256 128 64 32 16 8 Encoder Bit
1-2005
340 - 164
1-2005
340 - 165
What are
Band Classes?
Band Frequency Class Range 0 800 MHz. 1 1900 MHz. 2 TACS 3 JTACS 4 Korean PCS 5 450 MHz. 6 2 GHz. 7 700 MHz. 8 1800 MHz. 9 900 MHz.
1-2005
340 - 167
1-2005
340 - 168
1-2005
340 - 169
1-2005
340 - 170
1-2005
340 - 172
1-2005
340 - 173
The TDM?
Thats not an analog combiner like in IS-95. Its a time division multiplexer!
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 174
The Forward Pilot Channel is all 0 symbols covered with Walsh Code 0 (all 0) and transmitted on the I channel, not steadily but in bursts.. Each slot is divided into two half-slots, and theres a pilot burst in the middle of each of them. Pilot bursts are 96 chips long. The MAC Channel includes three subchannels: the Reverse Power Control (RPC) Channel (controlling terminal transmit power) the DRCLock Channel, and the Reverse Activity (RA) Channel (a bitstream concerned with reverse activity) Each MAC Channel symbol is BPSK modulated on one of 64 64-ary Walsh codes. All the MAC symbol Walsh covers are transmitted four times per slot in bursts of 64 chips each, just before and just after each pilot burst. The Walsh channel gains may vary the relative power.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 175
The Forward Traffic Channel and Control Channel transmit data to access terminals Forward Traffic Channel data rates can be from 38.4 kbps to 2.4576 Mbps. Data on these channels are encoded into blocks called physical layer packets. The encoded packets are scrambled, interleaved, then fed into a modulator modulation is QPSK, 8-PSK, or 16-QAM, as determined by data speed The modulated symbols are repeated and punctured, if necessary The resulting sequences of modulation symbols are demultiplexed to form 16 pairs (in-phase and quadrature) of parallel streams. Each of the parallel streams is covered with a unique 16-chip Walsh code running at 1.2288 Mcps; the Walsh code repeats 76.8 ksps. All 16 streams Walsh symbols are then summed together to form a single inphase stream and a single quadrature stream at a chip rate of 1.2288 Mcps. The resulting chips are time-division multiplexed with the preamble, Pilot Channel, and MAC Channel chips
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 176
1-2005
340 - 177
Data Rate (kbps) Concatenated Code rate Information Bits per Encoder Packet Effective no. of Tail Bits Code Interleaver length (binary symbols) PN Generator for Code Interleaver Encoder Output Block Length (code symbols)
1-2005
38.4, 76.8, 153.6 102.4, 153.6 Long, Short, 204.8, 307.2 307.2 Short, 614.4 Long 1/4 1019 0.25 2046 P11[x] 4096 1/4 4091 0.25 8190 P13[x] 16384
921.6
340 - 179
1-2005
340 - 180
1-2005
340 - 182
1-2005
340 - 183
MAC Layer Packet Encapsulation on the Forward and Reverse Traffic Channels
1-2005
340 - 184
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
The Default Control Channel MAC Protocol gives the procedures and messages required to run the Control Channel The network maintains one instance of this protocol for all access terminals. This protocol can be in one of two states: Inactive State: in this state the network waits for an Activate command. This state happens when the access terminal has not acquired an access network, or is not monitoring the Control Channel. Active State: in this state the access network transmits and the access terminal receives the Control Channel.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 185
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
The Default Access Channel MAC Protocol gives the procedures and messages required to operate the Access Channel. This specification assumes that the access network has one instance of this protocol for each access terminal. This protocol has two states: Inactive State: The Access Terminal doesnt communicate on the Access Channel. The network watches for an Activate command from the terminal, which it sends if it newly acquires the network or ends any connection it may already have open. Active State: The access terminal has already Activated and may now transmit on the Access Channel whenever desired.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 186
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
ATs may start sending probes only at the Access Channel Cycle Start In an access probe, the AT first sends pilot (I-channel) only, as a preamble After the preamble, the AT also sends the Q-channel to carry its message preamble duration is set to (PreambleLength 16 slots) message capsule can be up to CapsuleLengthMax 16 slots long The AT must send another probe unless one of the following occurs Access terminal receives an ACAck message. a Deactivate command is received, forcing the AT to abort Maximum number of probes per sequence have been sent (ProbeNumStep) Before transmitting the first probe, the access terminal performs a persistence test to avoid congestion on the Access Channel. a persistence test is also performed between probe sequences.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 187
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
The Default Forward Traffic Channel MAC Protocol provides the procedures and messages operate the Forward Traffic Channel. It specifies Forward Traffic Channel addressing and Forward Traffic Channel rate control. The network tracks one instance of this protocol for each access terminal. There are three states: Inactive State: the access terminal has no Forward Traffic Channel. To get one, the AT must send an Activate command. Variable Rate State: the Forward Traffic Channel is transmitted at variable rate, requested by the access terminals DRC Fixed Rate State: the Forward Traffic Channel is transmitted to the access terminal from one particular sector, at one particular rate.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 188
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
The Default Reverse Traffic Channel MAC Protocol specifies transmission rules and rate control for the Reverse Traffic Channel . The network tracks one instance of this protocol for every access terminal. It has three states: Inactive State: The access terminal does not have a Reverse Traffic Channel. To get one, the AT must send an Activate command. Setup State: In this state, the access terminal negotiates for a session, already obeying power control commands from the access network, but not yet allowed to send data on the Reverse Traffic Channel. Open State: In this state, the access terminal may transmit data and negotiate different transmission rates on the Reverse Traffic Channel.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 189
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Security Protocol
Connection layer
The Security Layer provides: Key Exchange: AT and AN exchange security keys for authentication and encryption Authentication: AT and AN authenticate traffic Encryption: AT and AN encrypt traffic The Security Layer uses Key Exchange Protocol Authentication Protocol Encryption Protocol Security Protocol to provide these functions Security Protocol provides public variables needed by the authentication and encryption protocols (e.g., cryptosync time-stamp, etc.).
1-2005
340 - 190
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
1-2005
340 - 191
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
Authentication Protocol
The Default Authentication Protocol does not provide any services except transferring packets between the Encryption Protocol and the Security Protocol. It does not define any commands or return any indications. The protocol data unit for this protocol is an Authentication Protocol packet. Operation for the InConfiguration Protocol Instance Set fall-back values of the attributes to their default values If the InUse instance of this protocol has the same protocol subtype as this InConfiguration protocol instance, then set the fall-back values of the attributes defined by the InConfiguration protocol instance to match Operation for the InUse Protocol Instance set the value of the attributes for this protocol instance to defaults When Encryption Protocol packets are received, forward them to the Security Protocol. When Security Protocol packets are received, set the Encryption Protocol packet to the Authentication Protocol packet and forward the Encryption Protocol packet to the Encryption Protocol.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 192
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
Encryption Protocol
The Default Encryption Protocol does not alter the Security Layer packet payload (i.e., no encryption/decryption) it does not add an Encryption Protocol Header or Trailer; The Cipher-text for this protocol is equal to the Connection Layer packet. If needed, end-to-end encryption can be provided at the application layer (which is outside the scope of this specification).
1-2005
340 - 193
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
The connection between an Access Terminal and the Access Network can be in either of two states -- closed or open: Closed Connection: the access terminal has no dedicated air-link resources. Any communications are over the Access Channel and the Control Channel. Open Connection: the access terminal can be assigned the Forward Traffic Channel, and is assigned a Reverse Power Control Channel and a Reverse Traffic Channel. Communications between the access terminal and the access network are conducted over these assigned channels, as well as over the control channel.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 194
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
Packet Consolidation Protocol: This protocol consolidates and prioritizes packets for transmission as a function of their assigned priority and the target transmission channel.
1-2005
340 - 195
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
Route Update Protocol: keeps track of an access terminals location and maintains the radio link between the access terminal and the access network. The main thrust of this protocol is tracking pilots and requesting/managing the terminals active set. A route update in 1xEV-DO is similar in several ways to a handoff in IS-95 or IS-2000.
1-2005
340 - 196
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
The Default Route Update Protocol keeps track of the access terminals approximate location to maintain the radio link as the access terminal moves between the coverage areas of different sectors. This protocol can be in one of three states: Inactive State: The protocol waits for an Activate command. Idle State: As in the Air-Link Management Protocol Idle State, the AT autonomously manages the Active Set. Route update messages from the access terminal to the access network are triggered by terminal-computed distance between the current serving sector and the serving sector at the time of the last update. Connected State: As in the Air-Link Management Protocol Connected State, the access network dictates the access terminals Active Set. Route update messages from the access terminal to the access network are based on changing radio link conditions.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 197
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
Route Update Report Rules The AT sends RouteUpdate messages to the AN to update its location No RouteUpdate message is sent while connection timer is active. anytime it transmits on the Access Channel. anytime the formula below gives a value r greater than the value told to the AT by the last sector on which it performed a location update (xL,yL) are the longitude and latitude of the last sector where the AT performed a route update. (xC,yC) are the longitude and latitude of the sector currently covering the access terminal. The AT must compute r with an error of no more than 5% of its true value when |yL/14400| < 60 and with an error of no more than 7% of its true value when |yL/14400| is between 60 and 70. (This specification is given to ensure any abbreviated computation algorithms used by ATs are sufficiently accurate.) The RouteUpdate message includes the pilot PN phase, pilot strength, and drop timer status for every pilot in the Active Set and Candidate Set.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 198
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
The QuickConfig message and the SectorParameters message are collectively termed the overhead messages. Broadcast by the access network, they carry essential parameters to the ATs over the Control Channel and affect multiple other protocols. The Overhead Messages Protocol: manages transmission, reception and supervision of these messages and supervises the pilots There are two possible Overhead Messages Protocol states: Inactive State: the access terminal has not acquired an access network or is not required to receive overhead messages. the network waits for an Activate command. Active State: the AN transmits overhead messages to the AT
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 199
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
Air Link Management Protocol: This protocol maintains the overall connection between the access terminal and the access network. There are three states: Initialization State: Access Terminal hasnt yet acquired network Idle State: AT acquired network but connection is closed Connected State: AT has open connection with access network Depending on its current state, this protocol activates Initialization State Protocol, Idle State Protocol, or Connected State Protocol
1-2005
340 - 200
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
The Default Initialization State Protocol manages the process of an access terminal acquiring a serving network. At the access terminal, this protocol operates in one of the following four states: Inactive State: protocol waits for an Activate command. Network Determination State: the access terminal chooses an access network on which to operate. Pilot Acquisition State: access terminal acquires a Forward Pilot Channel. Synchronization State: access terminal synchronizes to the ControlChannel cycle, receives the Sync message, and synchronizes to system time.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 201
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
Idle State Protocol: manages an access terminal that has acquired the network, but does not have an open connection. keeping track of the access terminals approximate location in support of efficient Paging (using the Route Update Protocol) procedures leading to the opening of a connection support of access terminal power conservation.
1-2005
340 - 202
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
Connected State Protocol: manages an open connection with an access terminal that has an open connection managing the radio link between the access terminal and the access network performing handoffs via the Route Update Protocol connection closing procedures The Default Connected State Protocol can be in one of three states: Inactive State: protocol waits for an Activate command. Open State: AT can use the Reverse Traffic Channel and the AN can use the Forward Traffic Channel and Control Channel for traffic to each other. Close State: access network waits for safe release of connection resources
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 203
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
Default Session Management protocol controls activation of Address Management Protocol and then Session Configuration Protocol before a session is established. It periodically ensures that the session is still valid and manages closing the session. There are four states: Inactive State: applies only to the AT; there are no communications between the AT and the AN. AMP Setup State: The AT and AN make exchanges under Address Management Protocol and the AN assigns a UATI to the AT. Open State: a session is open. Close State: applies only to AN, waiting for close procedure to complete. Protocols activated by the Default Session Management Protocol. return indications which trigger most of the state transitions of this protocol.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 204
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
The Default Address Management Protocol provides the following functions: Initial UATI assignment Maintaining the access terminal unicast address as the access terminal moves between subnets. Default Address Management Protocol has three states: Inactive State: no communications between the AT and AN Setup State: The AT and AN exchange UATIRequest / UATIAssignment / UATIComplete to assign theAT a UATI. Open State: The AT has been assigned a UATI. The AT and AN may also perform a UATIRequest / UATIAssignment / UATIComplete or a UATIAssignment / UATIComplete exchange so that the access terminal obtains a new UATI.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 205
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
Default Session Configuration Protocol manages protocol negotiation and configuration during a session. It supports two phases of negotiation: Exchanges initiated by the AT to negotiate protocols used in the session and some of their parameters (authentication key lengths, etc). Exchanges initiated by the access network typically to override default values used by the negotiated protocols. Session Configuration Protocol uses Generic Configuration Protocol when negotiating. Even if the AT uses a Session Configuration Protocol other than the Default Session Configuration Protocol, it still uses the Default Session Configuration Protocol to negotiate that other protocol. Additional protocols may be negotiated without further modifications to the Default Session Configuration Protocol. Default Session Configuration Protocol has four states: Inactive State: the protocol waits for an Activate command. AT Initiated State: negotiation is performed at the initiative of the AT AN Initiated State: negotiation is performed at the initiative of the AN Open State: The AT may initiate session configuration procedure at any time and the AN may request the AT to do so at any time.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 206
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
1-2005
340 - 207
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
1-2005
340 - 208
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Stream Protocol
Connection layer
The Stream Layer provides: Multiplexing application streams for one access terminal. Stream 0 is always assigned to the Signaling Application. The other streams can be assigned to applications with different QoS (Quality of Service) requirements, or other applications. Configuration messages that map applications to streams, using Stream Layer Protocol. Data Encapsulation for the InUse Protocol Instance
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 209
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
The Default Signaling Application includes Signaling Network Protocol (SNP) and Signaling Link Protocol (SLP). Protocols in each layer use SNP to exchange messages. SNP is also used by application specific control messages. SNP provides a single octet header that defines the Type of the protocol and the protocol instance (i.e., InConfiguration or InUse) with which the message is associated. The SNP uses the header to route the message to the appropriate protocol instance. SLP provides message fragmentation, reliable and best-effort message delivery and duplicate detection for messages that are delivered reliably. The Signaling Link Protocol (SLP) has two layers: The delivery layer and the fragmentation layer. The SLP delivery layer (SLP-D) provides best effort and reliable delivery for SNP packets; duplicate detection/retransmission for messages using reliable delivery. It does not ensure in-order delivery. The SLP fragmentation layer (SLP-F) provides fragmentation for SLPD packets.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 210
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
Signaling Network Protocol (SNP) routes messages to protocols specified by the <InConfigurationProtocol, Type> pair of fields provided in the SNP header. The InConfigurationProtocol field in the SNP header determines whether the encapsulated message corresponds to the InUse protocol instance or the InConfiguration protocol instance. The actual protocol indicated by the Type is negotiated during session set-up. For example, Type 0x01 is associated with the Control Channel MAC Protocol. The specific Control Channel MAC Protocol used (and, therefore, the Control Channel MAC protocol generating and processing the messages delivered by SNP) is negotiated when the session is setup. The remainder of the message following the Type field (SNP header) is processed by the protocol specified by the Type. SNP is a protocol associated with the Default Signaling Application.
1-2005
340 - 211
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
The following requirements are common to all protocols that carry messages using SNP and that provide for message extensibility. Both access terminal and access network must comply with the following rules when generating and processing any signaling message carried by SNP. Messages are always an integer number of octets in length; and, if necessary, include a Reserved field at the end of the message to make them so. The receiver ignores the value of the Reserved fields. The first field of the message is always transmitted first. Within each field, the most significant bit of the field is always transmitted first. Message identifiers must be unambiguous for each protocol Type and for each Subtype for all protocols compatible with the Air Interface, defined by MinimumRevision and above. For future revisions, the transmitter adds new fields only at the end of a message (excluding any trailing Reserved field). The transmitter must not add fields if their addition makes the parsing of previous fields ambiguous for receivers whose protocol revision is equal to or greater than MinimumRevision. The receiver discards and ignores all unrecognized messages. The receiver shall discards and ignores all unrecognized fields.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 212
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
The Default Packet Application provides an octet stream that can be used to carry packets between the access terminal and the access network. It provides: The Radio Link Protocol (RLP), which provides retransmission, and duplicate detection, thus, reducing the radio link error rate as seen by the higher layer protocols. Packet Location Update Protocol, which defines location update procedures and messages in support of mobility management for the Packet Application. Flow Control Protocol, which provides flow control for the Default Packet Application.
1-2005
340 - 213
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
Radio Link Protocol (RLP) provides an octet stream service with an acceptably low erasure rate for efficient operation of higher layer protocols (e.g., TCP). When used as part of the Default Packet Application, the protocol carries an octet stream from the upper layer. RLP uses Nakbased retransmissions. Protocol Data Unit: The transmission unit of this protocol is an RLP packet. RLP is unaware of higher layer framing; it operates on a featureless octet stream. RLP receives octets for transmission from the higher layer and forms an RLP packet by concatenating the RLP packet header with a number of received contiguous octets. RLP follows policies beyond this documents scope in determining the number of octets to send in an RLP packet. It is subject to the requirement that an RLP packet shall not exceed the maximum payload length that can be carried by a Stream Layer packet given the target channel and current transmission rate on that channel. RLP makes use of the Reset, ResetAck, and Nak messages to perform control related operations. When RLP sends these messages it uses the Signaling Application.
1-2005
340 - 214
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
The Location Update Protocol defines location update procedures and messages for mobility management for the Default Packet Application. The transmission unit of this protocol is a message. It is a control protocol, so it does not carry payload for other layers or protocols. When the protocol in the access network receives an AddressManagement.SubnetChanged indication, the access network: May query the information with a LocationRequest message May update the location with a LocationAssignment message When the access terminal receives a LocationRequest message, it sends a LocationNotification message. If it has a stored value for the LocationValue parameter, it sets the LocationType, LocationLength, and LocationValue fields in this message to its stored values of these fields. If it does not have a stored value for the LocationValue parameter, the access terminal omits the LocationLength and LocationValue fields in this message. If the access terminal receives a LocationAssignment message, sends a LocationComplete message and stores the value of the LocationType, LocationLength, and LocationValue fields of the message in the corresponding variables.
1-2005 Course Series 340v3.2 (c)2005 Scott Baxter 340 - 215
Application layer
Stream Protocol Session Management Protocol Air Link Management Protocol Packet Consolidation Protocol Security Protocol Control Channel MAC Protocol Address Management Protocol Initialization State Protocol Route Update Protocol Key Exchange Protocol Forward Traffic Channel MAC Protocol Authentication Protocol Access Channel MAC Protocol Idle State Protocol Session Configuration Protocol Connected State Protocol Overhead Messages Protocol Encryption Protocol Reverse Traffic Channel MAC Protocol
Connection layer
Flow Control Protocol provides procedures and messages used by the access terminal and the access network to perform flow control for the Default Packet Application. It has the following states: Close State: in this state the Default Packet Application does not send or receive any RLP packets. Open State: in this state the Default Packet Application can send or receive RLP packets. The flow control protocol is a protocol under the default packet application.
1-2005
340 - 216
1-2005
340 - 217
1-2005
340 - 218
1-2005
340 - 219
1-2005
340 - 220