SlideShare a Scribd company logo
1 of 58
Krishna Adapa V M
UMTS System Architecture
   UMTS QoS architecture and Evolution
   Service and User Prioritization Strategies
   QoS Management in RNS/FAP
       Release 99 Channels
       HSDPA Channels
       HSUPA Channels
   QoS Management in Core Network Elements
   QoS Management in Backhaul Network
   Scope: Quality of Service (QoS) is a network wide topic
    and its actual scope in-terms of depth and width are
    tremendous. This presentation is primarily meant to
    focus on the Home Node B (HNB) NW element related
    functionality pertaining to Guaranteed Bit Rate (GBR)
    implementations. Other aspects are just touched to
    provide relevant overview of the topic under
    consideration. Some aspects are purposefully
    simplified when compared to the functionality of
    macro network element (NodeB/RNC)

   Acknowledgements: Simulations, Algorithms and
    other concepts referred in this presentation are
    obtained from listed references. They are, by no means,
    original contributions from the author.
3GPP Architecture Evolution
   Voice over IP (VOIP):
       Mouth to ear delays (200 to 300 msec)
       Packet RTT (150 to 200msec)
       Bit Rate (16 to 64 kbps) depending on CoDeCs
   Web browsing:
       High data rate (200 to 400kbps)
       Short packet RTT (<200msec)
   Streaming:
       Bit rate 64kbps to 128kbps
       Stable bit rates and small bit rate variations
UMTS

TE                MT                    RAN               CN                    CN               TE
                                                          EDGE                Gateway
                                                          NODE
                                          End-to-End Service



 TE/MT Local                             UMTS Bearer Service                       External Bearer
 Bearer Service                                                                    Service


                          Radio Access Bearer Service             CN Bearer
                                                                   Service


                        Radio Bearer       RAN Access              Backbone
                          Service          Bearer Service        Bearer Service



                       Physical Radio         Physical
                       Bearer Service         Bearer Service
TE                  MT                    RAN                               CN EDGE             Gateway             Ext.
                                                                                                                    Netw.
                      Adm./Cap.          Adm./Cap.                  Adm./Cap.      Subscr.   Adm./Cap.
           Transl.     Control            Control                    Control       Control    Control    Transl.
 Local                                                                                                              Ext.
Service                                                                                                            Service
Control         UMTS BS                                                      UMTS BS              UMTS BS          Control
                Manager                                                      Manager              Manager
                                           RAB
                                          Manager


          Local BS     Radio BS     Radio BS        RA BS            RA BS         CN BS      CN BS      Ext. BS
          Manager      Manager      Manager        Manager          Manager       Manager    Manager     Manager


                        RAN          RAN            RA NS            RA NS         BB NS      BB NS
                       ph. BS M     ph. BS M       Manager          Manager       Manager    Manager


               protocol interface              service primitive interface
TE          MT                             RAN                       CN EDGE                    Gateway           Ext.
                                                                                                                 Netw.


                                                                                               Class
                                                                                                 if.
             Class
               if.                                                                             Cond.
             Cond.
                                   Cond.           Mapper          Mapper                       Mapper


 Local BS    Resource          Resource            Resource    Resource      Resource     Resource       External BS
             Manager           Manager             Manager     Manager       Manager      Manager


                 RAN phys. BS                   RAN Access network service     BB network service

                     data flow with indication of direction
   Traffic Class
   Maximum Bit Rate
   Guaranteed Bit Rate
   Delivery Order
   Maximum SDU Size
   SDU Format Information
   SDU Error Ratio
   Residual Bit Error Ratio
   Delivery of Erroneous SDUs
   Transfer Delay
   Traffic Handling Priority
   Allocation/Retention Priority
   Source Statistics Descriptor
   QoS Parameter Request by the UE at PDP Ctx
    Activation to SGSN. SGSN Admission Control.
   QoS parameter negotiation between SGSN – GGSN in
    Create PDP context request/response. GGSN
    Admission Control.
   QoS parameter negotiation between SGSN – FAP
    through RAB Assignment Request/Response
   Radio Interface Protocol parameters derivation by FAP
    Admission Control (RLC modes, SIR/BLER targets,
    Transport         channels      selection,       TFCS
    selection/definition, Scheduling Priority Indicator
    derivation, GBR configuration etc) and Radio Bearer
    configuration
   Negotiated QoS profile to UE in PDP Context Accept
    (if accepted)
   In R5: Allows Proxy Call Session Control Function (P-CSCF)
    (Policy Decision Function - PDF) to provide dynamically the IMS
    application characteristics to GGSN through Go interface
   GGSN acts as an enforcement point (PEP) and thus enables
    dynamic QoS control by performing gating on the user data flows
   In R6: The PDF is logically separated from Application Function
    (ex, P-CSCF) through Gq interface, allows dynamic QoS support
    for non IMS domains
   Also allows other than SIP and SDP application session protocols
    to be used
   Allows the possibility to multiplex               several    service
    applications/multimedia components on to the same PDP context.
    The PDF remains single and same QoS is applied to all
    components.
   NOTE: This is just for information: Clearly 3GPP R5/R6 is a
    significant architectural shift from the existing base architecture.
    So, proposal is we will not implement this.
Subscription Profile             AF
                                           Repository
                                             (SPR)
                                                                   Rx




                                                        Sp    Policy and Charging
                                                                Rules Function
                                                                     (PCRF)
        Online Charging System (OCS)

       CAMEL          Service Data Flow
        SCP                 Based                                 Gx
                       Credit Control



                                                                       PCEF
                                                   Gy


                                                                   GW
                                                                  Gz

                                                                  Offline
                                                                 Charging
                                                                  System
                                                                  (OFCS)



NOTE: This is just for information: Clearly 3GPP R5/R6 is a
  significant architectural shift from the existing base
  architecture. So, proposal is we will not implement this.
   Diverse applications and diverse QoS requirements
   For the purpose of QoS management, applications can
    be categorized (3GPP R99 categorization) in to:
       Conversational
       Streaming
       Interactive
       Background
   For the simplicity, we would propose maintaining four
    distinctive QoS profiles at the Core Network each
    correspond to one Traffic Class. These profiles shall be
    configurable (be careful when changing since we
    would only change to a value that we are sure we
    could sustain in our network) and are picked by SGSN
    depending on the Traffic Class received
   In many a network, operator would like to
    prioritize a certain group of users depending on
    their subscription/user profiles. For ex, users
    could be categorized in to:
   Gold Users: Gold users are users by the virtue of
    their subscription gets highest privilege in the
    network
   Silver Users: Silver users are next to Gold users in
    terms of their treatment (data of course!)
   Bronze Users: Bronze users receive the lowest
    attention.    Their    QoE     depends     on    the
    presense/absence of other higher priority users in
    the network at any given moment
   Priority assignment/differential treatment that
    a user’s data flow gets in the network depends
    on:
       The application characteristics and/or
       User prioritizations and/or
       Other operator policies
   For ex, we could imagine:
     Case1: An operator policy which is user category
      centric
     Case2: An operatory policy which is application
      centric
•   I would propose
                                                to make this
                                                mapping
                                                configurable to
                                                leave          the
                                                flexibility to the
                                                customer        to
                                                accommodate
                                                their changing
                                                requirements
                                            •   For     ex,    one
                                                could       assign
                                                SPI15 to SPI4 to
                                                MC0 to MC11




   A Management Class (MC) is a way that we would like to
    treat a user’s data in the network
NOTE: Study is pending on the need for the requirement of
   PDP context modification procedure and/or Secondary PDP
   context support depending on different scenarios (explained
   in later slides). For ex,

1)   An application is launched when no PDP context exist. This
     might lead to a primary PDP context activation with a
     proper Traffic Class included

2)    An application is launched when a primary PDP context is
     already active (for ex, through a former web browsing
     session). This might lead to a PDP context modification to
     activate/re-negotiate a QoS profile which is the best of both
     applications. Another possibility could be that it leads to a
     Secondary PDP context activation depending on whether the
     UE supports secondary PDP context
   In summary, there are practical difficulties in
    selecting one of them:
       MS do not request any QoS
       Many MS support single PDP context
       The Application API being open, potential misuse of RT
        PDP contexts
   One possibility is to implement non-standard
    defined service differentiation in GGSN for ex, by
    looking inside the IP flow through Layer4/7
    lookup
   Once the user service is identified, then the QoS is
    upgraded/downgraded through PDP context
    modification. When several IP flows are existing
    for the same PDP context, the one with the need of
    maximum QoS can be provisioned
   Parameters relevant for the QoS treatment in the Core
    Network for traffic differentiation are:




• Bandwidth Management and CPU utilization management
  are two aspects that can be considered for QoS management
  in CNE nodes
• We could consider some BW is allocated for each TC and the
  AC will monitor this for the RT/NRT user admission
• Similarly for CPU thresholds can be defined for the AC
  purposes for RT/NRT users
• These Topics are FFS
   There are three area of QoS treatment in CNE:
   Functions/procedures that implement QoS
    inside the CNE nodes, for ex, as described
    earlier:
     BW management
     CPU management
   QoS management at CNE edge interfaces for
    the Traffic Management
       Interface towards external networks (DiffServe edge
        functionality towards external IP network)
       Interface towards Iu, Gn (DiffServ edge functionality
        towards radio and backbone network)
   SGSN and GGSN will mark the DSCP in the transport
    IP header according the the traffic handling priorities
    previously defined
   QoS aware (DiffServe supported functionality) routers
    in the IP network would examine this DSCP filed and
    treat according to the priorities defined
   An example of DiffServ marking table is include in
    Appendix – C
   NOTE: We many not need to implement this
    functionality of DSCP marking towards Iu since it
    would be either a VLAN or LAN between SGSN and
    FAP in our network (this is FFS)
   The traffic conditioning in GGSN is used to
    monitor the ingress traffic characteristics (data
    rate) against the negotiated QoS parameters
    (Maximum Bit Rate - MBR/Guaranteed Bit Rate -
    GBR)
   One typical example algorithm that could be used
    (proposed as normative reference algorithm in
    3GPP) is a Token Bucket Algorithm:
   The input to the bucket is the incoming bursty data
    flow and the out put is the conditioned data flow
    at the negotiated rate.
OK                  OK                Non-compliant

TBC

            L1<TBC              L2<TBC             L3>TBC
b

                              b-L1+r*    T




            b-L1




                              Time




Notation Used in the Above Algorithm:
  b – Bucket Size
  TBC – Token Bucket Counter (available tokens)
  L1, L2, L3 – Received Packet Lengths
  R – Conditioned Rate/Output rate
Release 99 Channels
   Transport Channel Selection
   Power Control (Not treated in length in this
    presentation)
     Open Loop Power Control
     Fast Power Control (Inner Loop)
     Slow Power Control (Outer Loop)

   Admission Control (R99, HSDPA, HSUPA)
   Load Control
   Packet Scheduling (R99, HSDPA, HSUPA)
   Handover Control (Not dealt in this presentation)
   The type of transport channel selected is
    influenced by for ex, the QoS attributes and
    system performance.
   As an example, the delay sensitive applications
    involving conversational traffic class can be
    carried over DCH
   One idea would be to make the mapping table
    operator configurable
   NGBR traffic is always admitted except in the case of
     system overload, defined by:


• GBR traffic is admitted when in addition to above condition:



• Where:
     – PtxTotal: Current total transmitted power: Available from FAP
       common measurements
     – PtxTarget: Target transmit power: Known at FAP
     – PtxNC: Non Controlled power of GBR users: To be calculated
       (TBD)
     – DelP: Estimated power for the new GB users (see next Slide)
    The downlink power needed for the new GBR user can
         be calculated by the open-loop method as follows:




•       Where:
•       R: Required Guaranteed Bit Error Rate (GBR): Known at FAP
•       (Eb/No)dl: Downlink needed to achieve a level of error performance
        (BLER). Derived from the service, coverage and capacity planning: To be
        Derived (TBD)
•       CPICH_Tx_power: Total transmitted CPICH power: Known at FAP
•       (Ec/No)cpich: CPICH received Chip energy to Noise power. Available
        from UE measurement report
•       PtxTotal: Total transmitted power in the cell: Known at FAP
•       Alpha: Orthogonality factor: Configurable/Tunable parameter at FAP
   An NRT bearer is admitted if:


• An RT bearer is admitted when above condition is fulfilled and if:




• PrxTotal: Received Total Wideband Power (RTWP): Available
  from PICO L1 measurements
• PrxTarget: Target Received Total Wideband Power
  (RTWPtarget): Known at FAP
• DelI: Increase of wide band power caused by RT user:
  Unknown (To be Estimated)
• PrxNC: Non-controlled power received (GBR users + Other
  cell users) – Need to see if this is Reference Total Wideband
  Power (when reported by PICO L1)
   The increase in the received wide band power due to
     admitting a GBR user can be calculated using:
    Derivative method:



• Integral method:




• The fractional load increase is calculated by (refer next slide):
    Calculate the CDMA uplink load which is the sum of the loads of each user




•       Or by using (a simplified equation when the power of user Pk << Iown




NOTE: Above load equations are derived from general CDMA Eb/No notion:
• In some exceptional cases (exceptional when system is
  designed properly), the system can be overload. The
  overload condition is defined by:




   When such overloaded occurs, Load Control is used to bring
    the system back under control. Different strategies exist:
       Reduce the NGBR bit rates
       Drop low priority connections
       Reduce GBR bit rates
       Drop GBR connections (for ex, based on SPI)
   Assign Radio Resource Priority (RRP) for each
    bearer during Admission Control
   Dynamically manage the RRP according to the
    served bit rate
   Determine the TFC set according to the QoS
    parameters received (for ex, maximum and
    minimum bit rates) for GBR and NGBR bearers
   For a GBR bearer, the resource requests are always
    treated (provided the Ptarget criteria is met)
   The Pngbr is derived as the power available for
    NGBR bit rate scheduling
   Different scheduling algorithms possible: Ex,
    Fair Throughput Sharing, Fair Resource
    Sharing
   In FT, the Pngbr is equally allocated to users
    according to their priorities and request arrival
    times.
   In FR, the Pngbr is allocated keeping in view of
    the signal quality experience by users (for ex,
    users nearer to BS/experiencing good
    conditions get better share) . This is achieved
    by TFC resizing.
High Speed Downlink Packet Access
       (HSDPA) Channels
   Scheduling Priority Indicator (SPI): Indicates
    the relative priority of each priority queue.
    Range from 0 to 15 (15 being the highest
    priority)
   Discard Timer (DT): Time to Live for a received
    MAC-hs SDU. The timer is started when the
    SDU is received at the queue. Range from
    20msec to 7500msec
   MAC-hs GBR: Guaranteed no of bits that the
    Mac-hs needs to deliver under normal
    conditions.
   Non-HSDPA Power: Power of all codes not used
    for HS-DSCH and HS-SCCH transmission
    including common channels, simply termed as
    non-HSDPA power
   HS-DSCH Provided Bit Rate: Number of MAC-d
    PDU bits which are successfully transmitted over
    last measurement period divided by the
    measurement period. This is defined per SPI
   HS-DSCH Required Power: This is the power
    required for all users to meet their GBR criteria,
    reported per SPI. Non-GBR users are not included
   Unused power from DCH users is used for HSDPA scheduling
   In order to make sure that users admitted will meet their GBR
    criteria, it is important to dimension the DCH power and HSDPA
    power according to the capacity/coverage plans
   After transport channel selection, MAC-hs scheduler parameters
    defined above are assigned (SPI, GBR (same as the one received)
    and DT) as per policies defined.
   These policies could be, for ex, configurable at FAP/CNE, through
    a table. The following is such an example template (Note: MAC-hs
    GBR for Interactive/Background are optional)




NOTE: The above is just an example: In reality there shall have to be a correspondence between
  the MCs defined earlier and the table above as detailed earleir
   A new HSDPA GBR user (or a user being
    considered for the incoming handover) is admitted
    provided the following is satisfied:



• Phsdpa: Total configured HSDPA power: Known at FAP
• Pnew: Estimated power required to satisfy the new GBR user
• Pspi(x): Estimated power required to satisfy already admitted
  GBR users whose priority k greater than or equal to the
  priority of the new user (priority based AC): Obtained
  through PICO L1/L2 measurements
• Pscch: HS-SCCH estimated power: Known at FAP with some
  in-accuracy
• P0: Power Offset used to compensate estimation errors for
  Pnew, Pspi and Pscch: Configurable/Tunable Parameter
    The HS-DSCH SINR can be calculated from the following expression:




•       SF16: Spreading Gain factor corresponding to Spreading Factor 16
•       Ptx,dsch: HSDPA transmit power: Known at FAP
•       Ptx,pilot: CPICH transmit power: Known at FAP
•       Ppilot: CPICH Ec/Io: Obtained through UE measurement report
•       Alpha: Orthogonality factor: Configurable/Tunable Parameter
•       Pxtx,tot: Total Transmit Power: Known at FAP
   Calculate the maximum bit rate possible with the derived SINR
     figure (possibly through a table stored at FAP obtained through
     simulation studies - refer Annex for example)
    Power needed to serve the GBR for the new user is then calculated
     as:




• Ptx,dsch: HSDPA transmit power to achieve the throughput f(p):
  Known at FAP
• GBRnew: Guaranteed Bit Rate of the new GBR user: Known at FAP
• f(p): Derived throughput for the derived SINR: A priori knowledge
  from simulation study
   For an incoming handover, the same priority
    based admission control algorithm apply. Ie,
   The handover user with SPI x will have priority
    admission over all users with SPI <= x
   Usually in a macro scenario, the Admission
    Controls can implement special algorithms
    during intra-RNC handover procedure to see if
    the target cell can accommodate the GBR user.
   In the scenario of FAP no such special
    algorithms are possible since the view is
    limited to single cell
   Same principles as mentioned earlier for R99 load
    control apply for HSDPA or for a mixed load
    (DCH + HSDPA)
     Drop NGBR connections (note that the NGBR throughput
      is autonomously managed by scheduler with
      programmed SPI, so nothing much to be done there)
     Reduce GBR configuration for ex based on SPI
      configuration
     Possibly drop less priority GBR connections
     Overload control action could start either from DCH or
      from HSDPA (which one to be given importance could be
      configured through an operator defined parameter)
High Speed Uplink Packet Access
      (HSUPA) Channels
   The power utilization in the uplink when E-DCH
    is configured is shown below:
   The Admission Control for HSUPA is based on
    similar principles are R99 uplink admission (FFS)
   The Guaranteed Bit Rate (GBR) of HSUPA users is
    achieved using the non-scheduled grants
   FAP programs PICO L1/L2 and UE with certain
    grants (non-scheduled grants). UE uses there
    grants to send uplink transmission whenever it has
    data. PICO L1/L2 uses this value to reserve the
    uplink resources for the GBR users
   Delay and Error performances parameters
    derivation, related to HSUPA, from the QoS
    attributes are FFS
   In conventional networks, the GPRS CN is based
    on the IP transport network.
   Different solutions can be used for the service
    differentiation
     Differentiated service handling
     Multi Protocol Label Switching (MPLS)
     L2/L1 related methodologies like VLAN feature of
      ethernet
   Similar methods cold be used on IuB when the
    backhaul is based on the IP transport. If ATM is
    used, ATM specific methods like VBR, CBR can be
    used for differentiated traffic handling
   Quality of Service (QoS) Concept and Architecture
    – 3GPP 23.107
   QoS and QoE Management in UMTS Cellular
    Systems - David Soldani, Man Li, Renaud Cuny.
    John Wiley & Sons, LTD
   QoS Management in UMTS Terrestrial Radio
    Access FDD Networks, D.Soldani, Dissertation for
    PhD in Technology, Helsinki University of
    Technology, October 2005
   Policy and Charging Control Architecture – 3GPP
    23.203
   Quality Based HSDPA Access Algorithms – Claus
    I. Pedersen, IEEE VTC 2005
   Channel Profile: Pedestrian A
   UE Speed: 3 km/h
   Target BLER: 10%
   User positions simulated with Geometric (G) factor defined
    as own cell power to interference cell power received at UE
   Used MCS schemes are depicted in the table below
   HSDPA Throughput for a single code
Traffic class            Conversational class                Streaming class                Interactive class         Background class


Maximum bitrate (kbps)                  <= 256 000 (2) (7)                <= 256 000 (2) (7)            <= 256 000 (2) (7)         <= 256 000 (2) (7)
Delivery order                                Yes/No                            Yes/No                        Yes/No                     Yes/No
Maximum SDU size (octets)              <=1 500 or 1 502 (4)              <=1 500 or 1 502 (4)          <=1 500 or 1 502 (4)       <=1 500 or 1 502 (4)


SDU format information (1)                       (5)                              (5)
Delivery of erroneous SDUs                    Yes/No/-                         Yes/No/-                       Yes/No/-                   Yes/No/-


Residual BER                         5*10-2, 10-2, 5*10-3, 10-3,     5*10-2, 10-2, 5*10-3, 10-3, 10-   4*10-3, 10-5, 6*10-8 (6)   4*10-3, 10-5, 6*10-8 (6)
                                          10-4, 10-5, 10-6                    4, 10-5, 10-6


SDU error ratio                     10-2, 7*10-3, 10-3, 10-4, 10-5   10-1, 10-2, 7*10-3, 10-3, 10-4,       10-3, 10-4, 10-6           10-3, 10-4, 10-6
                                                                                  10-5

Transfer delay (ms)                    80 – maximum value               250 – maximum value


Guaranteed bit rate (kbps)              <= 256 000 (2) (7)                <= 256 000 (2) (7)
Traffic handling priority                                                                                       1,2,3
Allocation/Retention priority (1)
- Priority Level                             1,2, ..., 15                     1,2, ..., 15                   1,2, ..., 15               1,2, ..., 15
- Pre-emption Capability                      Yes/No                           Yes/No                         Yes/No                     Yes/No
- Pre-emption Vulnerability                   Yes/No                           Yes/No                         Yes/No                     Yes/No



Source statistic descriptor              Speech/unknown                   Speech/unknown
Signalling Indication                                                                                         Yes/No
UMTS QoS Architecture and Evolution

More Related Content

What's hot

Cisco Live! Designing Multipoint WAN QoS
Cisco Live! Designing Multipoint WAN QoSCisco Live! Designing Multipoint WAN QoS
Cisco Live! Designing Multipoint WAN QoSEddie Kempe
 
Quality of Servise
Quality of ServiseQuality of Servise
Quality of ServiseRaza_Abidi
 
Quality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task ForceQuality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task ForceJohn Loughney
 
Integrated and Differentiated services Chapter 17
Integrated and Differentiated services Chapter 17Integrated and Differentiated services Chapter 17
Integrated and Differentiated services Chapter 17daniel ayalew
 
QoS In The Enterprise
QoS In The EnterpriseQoS In The Enterprise
QoS In The EnterprisePrivate
 
Quality of Service(Queuing Methods)
Quality of Service(Queuing Methods)Quality of Service(Queuing Methods)
Quality of Service(Queuing Methods)Reza Farahani
 
Congestion control and quality of services
Congestion control and quality of servicesCongestion control and quality of services
Congestion control and quality of servicesJawad Ghumman
 
Bandwidth management and qos
Bandwidth management and qosBandwidth management and qos
Bandwidth management and qosShane Duffy
 
Protocol for QoS Support Chapter 18
Protocol for QoS Support Chapter 18Protocol for QoS Support Chapter 18
Protocol for QoS Support Chapter 18daniel ayalew
 
Thesis - Differentiated Optical QoS Service
Thesis - Differentiated Optical QoS ServiceThesis - Differentiated Optical QoS Service
Thesis - Differentiated Optical QoS ServiceLui Spatz Izarra
 
Fuzzy logic and Satellite communication Systems
Fuzzy logic and Satellite communication SystemsFuzzy logic and Satellite communication Systems
Fuzzy logic and Satellite communication SystemsQueen's University
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSKathirvel Ayyaswamy
 

What's hot (20)

Cisco Live! Designing Multipoint WAN QoS
Cisco Live! Designing Multipoint WAN QoSCisco Live! Designing Multipoint WAN QoS
Cisco Live! Designing Multipoint WAN QoS
 
Mpls Qos Jayk
Mpls Qos JaykMpls Qos Jayk
Mpls Qos Jayk
 
Qos Demo
Qos DemoQos Demo
Qos Demo
 
Quality of Servise
Quality of ServiseQuality of Servise
Quality of Servise
 
Quality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task ForceQuality of Service at the Internet Engineering Task Force
Quality of Service at the Internet Engineering Task Force
 
IntServ & DiffServ
IntServ & DiffServIntServ & DiffServ
IntServ & DiffServ
 
Integrated and Differentiated services Chapter 17
Integrated and Differentiated services Chapter 17Integrated and Differentiated services Chapter 17
Integrated and Differentiated services Chapter 17
 
QoS In The Enterprise
QoS In The EnterpriseQoS In The Enterprise
QoS In The Enterprise
 
Quality of Service(Queuing Methods)
Quality of Service(Queuing Methods)Quality of Service(Queuing Methods)
Quality of Service(Queuing Methods)
 
Congestion control and quality of services
Congestion control and quality of servicesCongestion control and quality of services
Congestion control and quality of services
 
Chap24
Chap24Chap24
Chap24
 
Bandwidth management and qos
Bandwidth management and qosBandwidth management and qos
Bandwidth management and qos
 
Admission Control Mechanism For Mpls Ds Te
Admission Control Mechanism For Mpls Ds TeAdmission Control Mechanism For Mpls Ds Te
Admission Control Mechanism For Mpls Ds Te
 
Qo s
Qo sQo s
Qo s
 
Protocol for QoS Support Chapter 18
Protocol for QoS Support Chapter 18Protocol for QoS Support Chapter 18
Protocol for QoS Support Chapter 18
 
Thesis - Differentiated Optical QoS Service
Thesis - Differentiated Optical QoS ServiceThesis - Differentiated Optical QoS Service
Thesis - Differentiated Optical QoS Service
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
How does VOIP work diagram
How does VOIP work diagramHow does VOIP work diagram
How does VOIP work diagram
 
Fuzzy logic and Satellite communication Systems
Fuzzy logic and Satellite communication SystemsFuzzy logic and Satellite communication Systems
Fuzzy logic and Satellite communication Systems
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKS
 

Viewers also liked

Quality of service in wireless communication
Quality of service in wireless communicationQuality of service in wireless communication
Quality of service in wireless communicationPRADEEP Cheekatla
 
60118029 hsdpa-parameter-description
60118029 hsdpa-parameter-description60118029 hsdpa-parameter-description
60118029 hsdpa-parameter-descriptionvittta sreeta
 
QoS Challenges and Solutions
QoS Challenges and SolutionsQoS Challenges and Solutions
QoS Challenges and SolutionsGoS Networks Ltd
 
QoS Strategy and White Paper
QoS Strategy and White PaperQoS Strategy and White Paper
QoS Strategy and White PaperJeffrey Sicuranza
 
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...IEEEFINALSEMSTUDENTSPROJECTS
 
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP ProtocolsTCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP ProtocolsPeter SHIN
 
電信顧問的特質與基本技能
電信顧問的特質與基本技能電信顧問的特質與基本技能
電信顧問的特質與基本技能Justin MA (馬嘉昌)
 
Zte utran ur11.1 optional feature description
Zte utran ur11.1 optional feature descriptionZte utran ur11.1 optional feature description
Zte utran ur11.1 optional feature descriptionMd Kamruzzaman
 
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Laili Aidi
 

Viewers also liked (12)

Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Quality of service in wireless communication
Quality of service in wireless communicationQuality of service in wireless communication
Quality of service in wireless communication
 
60118029 hsdpa-parameter-description
60118029 hsdpa-parameter-description60118029 hsdpa-parameter-description
60118029 hsdpa-parameter-description
 
QoS Challenges and Solutions
QoS Challenges and SolutionsQoS Challenges and Solutions
QoS Challenges and Solutions
 
QoS Strategy and White Paper
QoS Strategy and White PaperQoS Strategy and White Paper
QoS Strategy and White Paper
 
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
 
Automation of end-to-end QOS
Automation of end-to-end QOSAutomation of end-to-end QOS
Automation of end-to-end QOS
 
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP ProtocolsTCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
 
電信顧問的特質與基本技能
電信顧問的特質與基本技能電信顧問的特質與基本技能
電信顧問的特質與基本技能
 
Zte utran ur11.1 optional feature description
Zte utran ur11.1 optional feature descriptionZte utran ur11.1 optional feature description
Zte utran ur11.1 optional feature description
 
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
 
Lte World Summit 2010
Lte World Summit 2010Lte World Summit 2010
Lte World Summit 2010
 

Similar to UMTS QoS Architecture and Evolution

통신시스템(Gsm network)
통신시스템(Gsm network)통신시스템(Gsm network)
통신시스템(Gsm network)영기 김
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksJim Geovedi
 
rrc-procedures-in-lte
rrc-procedures-in-lterrc-procedures-in-lte
rrc-procedures-in-lteMorg
 
19080432 rrc-procedures-in-lte-comments-v1
19080432 rrc-procedures-in-lte-comments-v119080432 rrc-procedures-in-lte-comments-v1
19080432 rrc-procedures-in-lte-comments-v1vedaarunachalam
 
evolution towards NGN
evolution towards NGNevolution towards NGN
evolution towards NGNAJAL A J
 
통신시스템(Gprs network)
통신시스템(Gprs network)통신시스템(Gprs network)
통신시스템(Gprs network)영기 김
 
Mobile 2G/3G Workshop
Mobile 2G/3G WorkshopMobile 2G/3G Workshop
Mobile 2G/3G WorkshopJohnson Liu
 
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent)
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent) Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent)
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent) BP Tiwari
 
LTE Physical layer aspects
LTE Physical layer aspectsLTE Physical layer aspects
LTE Physical layer aspectsBP Tiwari
 
Rev 090003 R1
Rev 090003 R1Rev 090003 R1
Rev 090003 R1maddiv
 
BT Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
BT Represented at The Mobile VAS SUMMIT 2009 by Virtue InsightBT Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
BT Represented at The Mobile VAS SUMMIT 2009 by Virtue InsightParitosh Sharma
 
Chap02 gprs pro_03t_kh
Chap02 gprs pro_03t_khChap02 gprs pro_03t_kh
Chap02 gprs pro_03t_khFarzad Ramin
 
WebSocket - Enabling Technology for Dynamic Web Applications
WebSocket - Enabling Technology for Dynamic Web ApplicationsWebSocket - Enabling Technology for Dynamic Web Applications
WebSocket - Enabling Technology for Dynamic Web ApplicationsBergmans Mechatronics LLC
 
IEEE 1588 Timing for Mobile Backhaul_Webinar
IEEE 1588 Timing for Mobile Backhaul_WebinarIEEE 1588 Timing for Mobile Backhaul_Webinar
IEEE 1588 Timing for Mobile Backhaul_WebinarSymmetricomSYMM
 
Chap01 gprs intro_03_kh
Chap01 gprs intro_03_khChap01 gprs intro_03_kh
Chap01 gprs intro_03_khFarzad Ramin
 
DIANA: Scenarios for QoS based integration of IP and ATM
DIANA: Scenarios for QoS based integration of IP and ATMDIANA: Scenarios for QoS based integration of IP and ATM
DIANA: Scenarios for QoS based integration of IP and ATMJohn Loughney
 

Similar to UMTS QoS Architecture and Evolution (20)

통신시스템(Gsm network)
통신시스템(Gsm network)통신시스템(Gsm network)
통신시스템(Gsm network)
 
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksHITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
 
rrc-procedures-in-lte
rrc-procedures-in-lterrc-procedures-in-lte
rrc-procedures-in-lte
 
19080432 rrc-procedures-in-lte-comments-v1
19080432 rrc-procedures-in-lte-comments-v119080432 rrc-procedures-in-lte-comments-v1
19080432 rrc-procedures-in-lte-comments-v1
 
evolution towards NGN
evolution towards NGNevolution towards NGN
evolution towards NGN
 
통신시스템(Gprs network)
통신시스템(Gprs network)통신시스템(Gprs network)
통신시스템(Gprs network)
 
Mobile 2G/3G Workshop
Mobile 2G/3G WorkshopMobile 2G/3G Workshop
Mobile 2G/3G Workshop
 
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent)
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent) Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent)
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent)
 
LTE Physical layer aspects
LTE Physical layer aspectsLTE Physical layer aspects
LTE Physical layer aspects
 
Rev 090003 R1
Rev 090003 R1Rev 090003 R1
Rev 090003 R1
 
Rev 090003 R1
Rev 090003 R1Rev 090003 R1
Rev 090003 R1
 
BT Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
BT Represented at The Mobile VAS SUMMIT 2009 by Virtue InsightBT Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
BT Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
 
Introduction to GPRS
Introduction to GPRSIntroduction to GPRS
Introduction to GPRS
 
Chap02 gprs pro_03t_kh
Chap02 gprs pro_03t_khChap02 gprs pro_03t_kh
Chap02 gprs pro_03t_kh
 
WebSocket - Enabling Technology for Dynamic Web Applications
WebSocket - Enabling Technology for Dynamic Web ApplicationsWebSocket - Enabling Technology for Dynamic Web Applications
WebSocket - Enabling Technology for Dynamic Web Applications
 
IEEE 1588 Timing for Mobile Backhaul_Webinar
IEEE 1588 Timing for Mobile Backhaul_WebinarIEEE 1588 Timing for Mobile Backhaul_Webinar
IEEE 1588 Timing for Mobile Backhaul_Webinar
 
Chap01 gprs intro_03_kh
Chap01 gprs intro_03_khChap01 gprs intro_03_kh
Chap01 gprs intro_03_kh
 
Chap08 gb 03_kh
Chap08 gb 03_khChap08 gb 03_kh
Chap08 gb 03_kh
 
Software Defined RAN
Software Defined RANSoftware Defined RAN
Software Defined RAN
 
DIANA: Scenarios for QoS based integration of IP and ATM
DIANA: Scenarios for QoS based integration of IP and ATMDIANA: Scenarios for QoS based integration of IP and ATM
DIANA: Scenarios for QoS based integration of IP and ATM
 

Recently uploaded

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Recently uploaded (20)

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

UMTS QoS Architecture and Evolution

  • 1. Krishna Adapa V M UMTS System Architecture
  • 2. UMTS QoS architecture and Evolution  Service and User Prioritization Strategies  QoS Management in RNS/FAP  Release 99 Channels  HSDPA Channels  HSUPA Channels  QoS Management in Core Network Elements  QoS Management in Backhaul Network
  • 3. Scope: Quality of Service (QoS) is a network wide topic and its actual scope in-terms of depth and width are tremendous. This presentation is primarily meant to focus on the Home Node B (HNB) NW element related functionality pertaining to Guaranteed Bit Rate (GBR) implementations. Other aspects are just touched to provide relevant overview of the topic under consideration. Some aspects are purposefully simplified when compared to the functionality of macro network element (NodeB/RNC)  Acknowledgements: Simulations, Algorithms and other concepts referred in this presentation are obtained from listed references. They are, by no means, original contributions from the author.
  • 5. Voice over IP (VOIP):  Mouth to ear delays (200 to 300 msec)  Packet RTT (150 to 200msec)  Bit Rate (16 to 64 kbps) depending on CoDeCs  Web browsing:  High data rate (200 to 400kbps)  Short packet RTT (<200msec)  Streaming:  Bit rate 64kbps to 128kbps  Stable bit rates and small bit rate variations
  • 6. UMTS TE MT RAN CN CN TE EDGE Gateway NODE End-to-End Service TE/MT Local UMTS Bearer Service External Bearer Bearer Service Service Radio Access Bearer Service CN Bearer Service Radio Bearer RAN Access Backbone Service Bearer Service Bearer Service Physical Radio Physical Bearer Service Bearer Service
  • 7. TE MT RAN CN EDGE Gateway Ext. Netw. Adm./Cap. Adm./Cap. Adm./Cap. Subscr. Adm./Cap. Transl. Control Control Control Control Control Transl. Local Ext. Service Service Control UMTS BS UMTS BS UMTS BS Control Manager Manager Manager RAB Manager Local BS Radio BS Radio BS RA BS RA BS CN BS CN BS Ext. BS Manager Manager Manager Manager Manager Manager Manager Manager RAN RAN RA NS RA NS BB NS BB NS ph. BS M ph. BS M Manager Manager Manager Manager protocol interface service primitive interface
  • 8. TE MT RAN CN EDGE Gateway Ext. Netw. Class if. Class if. Cond. Cond. Cond. Mapper Mapper Mapper Local BS Resource Resource Resource Resource Resource Resource External BS Manager Manager Manager Manager Manager Manager RAN phys. BS RAN Access network service BB network service data flow with indication of direction
  • 9. Traffic Class  Maximum Bit Rate  Guaranteed Bit Rate  Delivery Order  Maximum SDU Size  SDU Format Information  SDU Error Ratio  Residual Bit Error Ratio  Delivery of Erroneous SDUs  Transfer Delay  Traffic Handling Priority  Allocation/Retention Priority  Source Statistics Descriptor
  • 10. QoS Parameter Request by the UE at PDP Ctx Activation to SGSN. SGSN Admission Control.  QoS parameter negotiation between SGSN – GGSN in Create PDP context request/response. GGSN Admission Control.  QoS parameter negotiation between SGSN – FAP through RAB Assignment Request/Response  Radio Interface Protocol parameters derivation by FAP Admission Control (RLC modes, SIR/BLER targets, Transport channels selection, TFCS selection/definition, Scheduling Priority Indicator derivation, GBR configuration etc) and Radio Bearer configuration  Negotiated QoS profile to UE in PDP Context Accept (if accepted)
  • 11. In R5: Allows Proxy Call Session Control Function (P-CSCF) (Policy Decision Function - PDF) to provide dynamically the IMS application characteristics to GGSN through Go interface  GGSN acts as an enforcement point (PEP) and thus enables dynamic QoS control by performing gating on the user data flows  In R6: The PDF is logically separated from Application Function (ex, P-CSCF) through Gq interface, allows dynamic QoS support for non IMS domains  Also allows other than SIP and SDP application session protocols to be used  Allows the possibility to multiplex several service applications/multimedia components on to the same PDP context. The PDF remains single and same QoS is applied to all components.  NOTE: This is just for information: Clearly 3GPP R5/R6 is a significant architectural shift from the existing base architecture. So, proposal is we will not implement this.
  • 12. Subscription Profile AF Repository (SPR) Rx Sp Policy and Charging Rules Function (PCRF) Online Charging System (OCS) CAMEL Service Data Flow SCP Based Gx Credit Control PCEF Gy GW Gz Offline Charging System (OFCS) NOTE: This is just for information: Clearly 3GPP R5/R6 is a significant architectural shift from the existing base architecture. So, proposal is we will not implement this.
  • 13.
  • 14. Diverse applications and diverse QoS requirements  For the purpose of QoS management, applications can be categorized (3GPP R99 categorization) in to:  Conversational  Streaming  Interactive  Background  For the simplicity, we would propose maintaining four distinctive QoS profiles at the Core Network each correspond to one Traffic Class. These profiles shall be configurable (be careful when changing since we would only change to a value that we are sure we could sustain in our network) and are picked by SGSN depending on the Traffic Class received
  • 15. In many a network, operator would like to prioritize a certain group of users depending on their subscription/user profiles. For ex, users could be categorized in to:  Gold Users: Gold users are users by the virtue of their subscription gets highest privilege in the network  Silver Users: Silver users are next to Gold users in terms of their treatment (data of course!)  Bronze Users: Bronze users receive the lowest attention. Their QoE depends on the presense/absence of other higher priority users in the network at any given moment
  • 16. Priority assignment/differential treatment that a user’s data flow gets in the network depends on:  The application characteristics and/or  User prioritizations and/or  Other operator policies  For ex, we could imagine:  Case1: An operator policy which is user category centric  Case2: An operatory policy which is application centric
  • 17. I would propose to make this mapping configurable to leave the flexibility to the customer to accommodate their changing requirements • For ex, one could assign SPI15 to SPI4 to MC0 to MC11  A Management Class (MC) is a way that we would like to treat a user’s data in the network
  • 18. NOTE: Study is pending on the need for the requirement of PDP context modification procedure and/or Secondary PDP context support depending on different scenarios (explained in later slides). For ex, 1) An application is launched when no PDP context exist. This might lead to a primary PDP context activation with a proper Traffic Class included 2) An application is launched when a primary PDP context is already active (for ex, through a former web browsing session). This might lead to a PDP context modification to activate/re-negotiate a QoS profile which is the best of both applications. Another possibility could be that it leads to a Secondary PDP context activation depending on whether the UE supports secondary PDP context
  • 19. In summary, there are practical difficulties in selecting one of them:  MS do not request any QoS  Many MS support single PDP context  The Application API being open, potential misuse of RT PDP contexts  One possibility is to implement non-standard defined service differentiation in GGSN for ex, by looking inside the IP flow through Layer4/7 lookup  Once the user service is identified, then the QoS is upgraded/downgraded through PDP context modification. When several IP flows are existing for the same PDP context, the one with the need of maximum QoS can be provisioned
  • 20.
  • 21. Parameters relevant for the QoS treatment in the Core Network for traffic differentiation are: • Bandwidth Management and CPU utilization management are two aspects that can be considered for QoS management in CNE nodes • We could consider some BW is allocated for each TC and the AC will monitor this for the RT/NRT user admission • Similarly for CPU thresholds can be defined for the AC purposes for RT/NRT users • These Topics are FFS
  • 22. There are three area of QoS treatment in CNE:  Functions/procedures that implement QoS inside the CNE nodes, for ex, as described earlier:  BW management  CPU management  QoS management at CNE edge interfaces for the Traffic Management  Interface towards external networks (DiffServe edge functionality towards external IP network)  Interface towards Iu, Gn (DiffServ edge functionality towards radio and backbone network)
  • 23. SGSN and GGSN will mark the DSCP in the transport IP header according the the traffic handling priorities previously defined  QoS aware (DiffServe supported functionality) routers in the IP network would examine this DSCP filed and treat according to the priorities defined  An example of DiffServ marking table is include in Appendix – C  NOTE: We many not need to implement this functionality of DSCP marking towards Iu since it would be either a VLAN or LAN between SGSN and FAP in our network (this is FFS)
  • 24.
  • 25.
  • 26. The traffic conditioning in GGSN is used to monitor the ingress traffic characteristics (data rate) against the negotiated QoS parameters (Maximum Bit Rate - MBR/Guaranteed Bit Rate - GBR)  One typical example algorithm that could be used (proposed as normative reference algorithm in 3GPP) is a Token Bucket Algorithm:  The input to the bucket is the incoming bursty data flow and the out put is the conditioned data flow at the negotiated rate.
  • 27. OK OK Non-compliant TBC L1<TBC L2<TBC L3>TBC b b-L1+r* T b-L1 Time Notation Used in the Above Algorithm:  b – Bucket Size  TBC – Token Bucket Counter (available tokens)  L1, L2, L3 – Received Packet Lengths  R – Conditioned Rate/Output rate
  • 29. Transport Channel Selection  Power Control (Not treated in length in this presentation)  Open Loop Power Control  Fast Power Control (Inner Loop)  Slow Power Control (Outer Loop)  Admission Control (R99, HSDPA, HSUPA)  Load Control  Packet Scheduling (R99, HSDPA, HSUPA)  Handover Control (Not dealt in this presentation)
  • 30. The type of transport channel selected is influenced by for ex, the QoS attributes and system performance.  As an example, the delay sensitive applications involving conversational traffic class can be carried over DCH  One idea would be to make the mapping table operator configurable
  • 31. NGBR traffic is always admitted except in the case of system overload, defined by: • GBR traffic is admitted when in addition to above condition: • Where: – PtxTotal: Current total transmitted power: Available from FAP common measurements – PtxTarget: Target transmit power: Known at FAP – PtxNC: Non Controlled power of GBR users: To be calculated (TBD) – DelP: Estimated power for the new GB users (see next Slide)
  • 32. The downlink power needed for the new GBR user can be calculated by the open-loop method as follows: • Where: • R: Required Guaranteed Bit Error Rate (GBR): Known at FAP • (Eb/No)dl: Downlink needed to achieve a level of error performance (BLER). Derived from the service, coverage and capacity planning: To be Derived (TBD) • CPICH_Tx_power: Total transmitted CPICH power: Known at FAP • (Ec/No)cpich: CPICH received Chip energy to Noise power. Available from UE measurement report • PtxTotal: Total transmitted power in the cell: Known at FAP • Alpha: Orthogonality factor: Configurable/Tunable parameter at FAP
  • 33. An NRT bearer is admitted if: • An RT bearer is admitted when above condition is fulfilled and if: • PrxTotal: Received Total Wideband Power (RTWP): Available from PICO L1 measurements • PrxTarget: Target Received Total Wideband Power (RTWPtarget): Known at FAP • DelI: Increase of wide band power caused by RT user: Unknown (To be Estimated) • PrxNC: Non-controlled power received (GBR users + Other cell users) – Need to see if this is Reference Total Wideband Power (when reported by PICO L1)
  • 34. The increase in the received wide band power due to admitting a GBR user can be calculated using:  Derivative method: • Integral method: • The fractional load increase is calculated by (refer next slide):
  • 35. Calculate the CDMA uplink load which is the sum of the loads of each user • Or by using (a simplified equation when the power of user Pk << Iown NOTE: Above load equations are derived from general CDMA Eb/No notion:
  • 36. • In some exceptional cases (exceptional when system is designed properly), the system can be overload. The overload condition is defined by:  When such overloaded occurs, Load Control is used to bring the system back under control. Different strategies exist:  Reduce the NGBR bit rates  Drop low priority connections  Reduce GBR bit rates  Drop GBR connections (for ex, based on SPI)
  • 37. Assign Radio Resource Priority (RRP) for each bearer during Admission Control  Dynamically manage the RRP according to the served bit rate  Determine the TFC set according to the QoS parameters received (for ex, maximum and minimum bit rates) for GBR and NGBR bearers  For a GBR bearer, the resource requests are always treated (provided the Ptarget criteria is met)  The Pngbr is derived as the power available for NGBR bit rate scheduling
  • 38. Different scheduling algorithms possible: Ex, Fair Throughput Sharing, Fair Resource Sharing  In FT, the Pngbr is equally allocated to users according to their priorities and request arrival times.  In FR, the Pngbr is allocated keeping in view of the signal quality experience by users (for ex, users nearer to BS/experiencing good conditions get better share) . This is achieved by TFC resizing.
  • 39. High Speed Downlink Packet Access (HSDPA) Channels
  • 40. Scheduling Priority Indicator (SPI): Indicates the relative priority of each priority queue. Range from 0 to 15 (15 being the highest priority)  Discard Timer (DT): Time to Live for a received MAC-hs SDU. The timer is started when the SDU is received at the queue. Range from 20msec to 7500msec  MAC-hs GBR: Guaranteed no of bits that the Mac-hs needs to deliver under normal conditions.
  • 41. Non-HSDPA Power: Power of all codes not used for HS-DSCH and HS-SCCH transmission including common channels, simply termed as non-HSDPA power  HS-DSCH Provided Bit Rate: Number of MAC-d PDU bits which are successfully transmitted over last measurement period divided by the measurement period. This is defined per SPI  HS-DSCH Required Power: This is the power required for all users to meet their GBR criteria, reported per SPI. Non-GBR users are not included
  • 42. Unused power from DCH users is used for HSDPA scheduling  In order to make sure that users admitted will meet their GBR criteria, it is important to dimension the DCH power and HSDPA power according to the capacity/coverage plans
  • 43. After transport channel selection, MAC-hs scheduler parameters defined above are assigned (SPI, GBR (same as the one received) and DT) as per policies defined.  These policies could be, for ex, configurable at FAP/CNE, through a table. The following is such an example template (Note: MAC-hs GBR for Interactive/Background are optional) NOTE: The above is just an example: In reality there shall have to be a correspondence between the MCs defined earlier and the table above as detailed earleir
  • 44. A new HSDPA GBR user (or a user being considered for the incoming handover) is admitted provided the following is satisfied: • Phsdpa: Total configured HSDPA power: Known at FAP • Pnew: Estimated power required to satisfy the new GBR user • Pspi(x): Estimated power required to satisfy already admitted GBR users whose priority k greater than or equal to the priority of the new user (priority based AC): Obtained through PICO L1/L2 measurements • Pscch: HS-SCCH estimated power: Known at FAP with some in-accuracy • P0: Power Offset used to compensate estimation errors for Pnew, Pspi and Pscch: Configurable/Tunable Parameter
  • 45. The HS-DSCH SINR can be calculated from the following expression: • SF16: Spreading Gain factor corresponding to Spreading Factor 16 • Ptx,dsch: HSDPA transmit power: Known at FAP • Ptx,pilot: CPICH transmit power: Known at FAP • Ppilot: CPICH Ec/Io: Obtained through UE measurement report • Alpha: Orthogonality factor: Configurable/Tunable Parameter • Pxtx,tot: Total Transmit Power: Known at FAP
  • 46. Calculate the maximum bit rate possible with the derived SINR figure (possibly through a table stored at FAP obtained through simulation studies - refer Annex for example)  Power needed to serve the GBR for the new user is then calculated as: • Ptx,dsch: HSDPA transmit power to achieve the throughput f(p): Known at FAP • GBRnew: Guaranteed Bit Rate of the new GBR user: Known at FAP • f(p): Derived throughput for the derived SINR: A priori knowledge from simulation study
  • 47. For an incoming handover, the same priority based admission control algorithm apply. Ie,  The handover user with SPI x will have priority admission over all users with SPI <= x  Usually in a macro scenario, the Admission Controls can implement special algorithms during intra-RNC handover procedure to see if the target cell can accommodate the GBR user.  In the scenario of FAP no such special algorithms are possible since the view is limited to single cell
  • 48. Same principles as mentioned earlier for R99 load control apply for HSDPA or for a mixed load (DCH + HSDPA)  Drop NGBR connections (note that the NGBR throughput is autonomously managed by scheduler with programmed SPI, so nothing much to be done there)  Reduce GBR configuration for ex based on SPI configuration  Possibly drop less priority GBR connections  Overload control action could start either from DCH or from HSDPA (which one to be given importance could be configured through an operator defined parameter)
  • 49. High Speed Uplink Packet Access (HSUPA) Channels
  • 50. The power utilization in the uplink when E-DCH is configured is shown below:
  • 51. The Admission Control for HSUPA is based on similar principles are R99 uplink admission (FFS)  The Guaranteed Bit Rate (GBR) of HSUPA users is achieved using the non-scheduled grants  FAP programs PICO L1/L2 and UE with certain grants (non-scheduled grants). UE uses there grants to send uplink transmission whenever it has data. PICO L1/L2 uses this value to reserve the uplink resources for the GBR users  Delay and Error performances parameters derivation, related to HSUPA, from the QoS attributes are FFS
  • 52. In conventional networks, the GPRS CN is based on the IP transport network.  Different solutions can be used for the service differentiation  Differentiated service handling  Multi Protocol Label Switching (MPLS)  L2/L1 related methodologies like VLAN feature of ethernet  Similar methods cold be used on IuB when the backhaul is based on the IP transport. If ATM is used, ATM specific methods like VBR, CBR can be used for differentiated traffic handling
  • 53. Quality of Service (QoS) Concept and Architecture – 3GPP 23.107  QoS and QoE Management in UMTS Cellular Systems - David Soldani, Man Li, Renaud Cuny. John Wiley & Sons, LTD  QoS Management in UMTS Terrestrial Radio Access FDD Networks, D.Soldani, Dissertation for PhD in Technology, Helsinki University of Technology, October 2005  Policy and Charging Control Architecture – 3GPP 23.203  Quality Based HSDPA Access Algorithms – Claus I. Pedersen, IEEE VTC 2005
  • 54. Channel Profile: Pedestrian A  UE Speed: 3 km/h  Target BLER: 10%  User positions simulated with Geometric (G) factor defined as own cell power to interference cell power received at UE  Used MCS schemes are depicted in the table below
  • 55. HSDPA Throughput for a single code
  • 56.
  • 57. Traffic class Conversational class Streaming class Interactive class Background class Maximum bitrate (kbps) <= 256 000 (2) (7) <= 256 000 (2) (7) <= 256 000 (2) (7) <= 256 000 (2) (7) Delivery order Yes/No Yes/No Yes/No Yes/No Maximum SDU size (octets) <=1 500 or 1 502 (4) <=1 500 or 1 502 (4) <=1 500 or 1 502 (4) <=1 500 or 1 502 (4) SDU format information (1) (5) (5) Delivery of erroneous SDUs Yes/No/- Yes/No/- Yes/No/- Yes/No/- Residual BER 5*10-2, 10-2, 5*10-3, 10-3, 5*10-2, 10-2, 5*10-3, 10-3, 10- 4*10-3, 10-5, 6*10-8 (6) 4*10-3, 10-5, 6*10-8 (6) 10-4, 10-5, 10-6 4, 10-5, 10-6 SDU error ratio 10-2, 7*10-3, 10-3, 10-4, 10-5 10-1, 10-2, 7*10-3, 10-3, 10-4, 10-3, 10-4, 10-6 10-3, 10-4, 10-6 10-5 Transfer delay (ms) 80 – maximum value 250 – maximum value Guaranteed bit rate (kbps) <= 256 000 (2) (7) <= 256 000 (2) (7) Traffic handling priority 1,2,3 Allocation/Retention priority (1) - Priority Level 1,2, ..., 15 1,2, ..., 15 1,2, ..., 15 1,2, ..., 15 - Pre-emption Capability Yes/No Yes/No Yes/No Yes/No - Pre-emption Vulnerability Yes/No Yes/No Yes/No Yes/No Source statistic descriptor Speech/unknown Speech/unknown Signalling Indication Yes/No