SlideShare a Scribd company logo
1 of 4
Download to read offline
FAQ on WCDMA Physical Layer (Layer 1)
                       Edited By Zahid Ghadialy (zahidtg@yahoo.com)

                                                                        Last Updated: 18/08/2006

  What happens when the Mobile is switched on? How does it find the Scrambling code to
camp on?




When the mobile The synchronization procedure starts with downlink SCH synchronization.
The UE knows the SCH primary synchronization code, which is common to all cells. The slot
timing of the cell can be obtained by receiving the primary synchronization channel (P-SCH)
and detecting peaks in the output of a filter that is matched to this universal synchronization
code. The slot synchronization takes advantage of the fact that the P-SCH is only sent during the
first 256 chips of each slot. The whole slot is 2,560 chips long. This is depicted in Figure above.
Thus the UE can determine when a slot starts, but it does not know the slot number yet (there
are 15 slots in each frame), and thus it does not know where the radio frame boundary may be.

Thereafter the UE correlates the received signal from the secondary synchronization channel (S-
SCH) with all secondary synchronization codes (SSC), and identifies the maximum correlation
value. The S-SCH is also only sent during the first 256 chips of every slot. One SSC is sent in
every time slot. There are 16 different SSCs, and they can form 64 unique secondary SCH
sequences. One sequence consists of 15 SSCs, and these sequences are arranged in such a way
that in any nonzero cyclic shift less than 15 of any of the 64 sequences is not equivalent to some
other sequence. This means that once the UE has identified 15 successive SSCs, it can
determine the code group used as well as the frame boundaries (i.e., frame synchronization).
Reference: Introduction to 3G Mobile Communications - Juha Korhonen

  What is RACH and how does it work?

The Random Access Channel (RACH) is an uplink transport channel. The RACH is always
received from the entire cell. The RACH is characterized by a collision risk and by being
transmitted using open loop power control. The Random Access Channel (RACH) is typically
used for signalling purposes, to register the terminal after power-on to the network or to perform
location update after moving from one location area to another or to initiate a call. The structure
of the physical RACH for signalling purposes is the same as when using the RACH for user data
transmission.




In UTRA the RACH procedure has the following phases:

           y   The terminal decodes the BCH to find out the available RACH sub-channels and
               their scrambling codes and signatures.
           y   The terminal selects randomly one of the RACH sub-channels from the group its
               access class allows it to use. Furthermore, the signature is also selected randomly
               from among the available signatures.
           y   The downlink power level is measured and the initial RACH power level is set
               with the proper margin due to the open loop inaccuracy.
           y   A 1 ms RACH preamble is sent with the selected signature.
           y   The terminal decodes AICH to see whether the base station has detected the
               preamble.
           y   In case no AICH is detected, the terminal increases the preamble transmission
               power by a step given by the base station, as multiples of 1 dB. The preamble is
               retransmitted in the next available access slot.
           y   When an AICH transmission is detected from the base station, the terminal
               transmits the 10 ms or 20 ms message part of the RACH transmission.

The RACH procedure is illustrated in Figure above, where the terminal transmits the preamble
until acknowledgement is received on AICH, and then the message part follows. In the case of
data transmission on RACH, the spreading factor and thus the data rate may vary; this is
indicated with the TFCI on the DPCCH on PRACH. Spreading factors from 256 to 32 have
been defined to be possible, thus a single frame on RACH may contain up to 1200 channel
symbols which, depending on the channel coding, maps to around 600 or 400 bits. For the
maximum number of bits the achievable range is naturally less than what can be achieved with
the lowest rates, especially as RACH messages do not use methods such as macro-diversity as in
the dedicated channel.

Reference: WCDMA for UMTS: Radio Access for Third Generation Mobile Communications -
Harri Holma

  What is the significance of SFN and CFN?

SFN is the frame number used by the physical layer. CFN is the frame number used by the
MAC layer. SFN is independent of the UE contexts, but associated with the Radio Link. CFN is
associated with a UE context. The RRC layer maintains the mapping between CFN and various
(for each RL) SFNs.

  What is compressed mode and is it necessary for the UE to support compressed mode?

Compressed mode is needed if the UE needs to perform Inter-Frequency or Inter-RAT
measurements. More details on what compressed mode is and how its performed can be seen in
Compressed Mode Tutorial.

Compressed Mode is performed in Uplink(UL) as well as in Downlink(DL). Uplink compressed
mode must be used if the frequency to be measured is close to the uplink frequency used by the
UTRAN air interface (i.e., frequencies in TDD mode/GSM 1800/1900 band). Otherwise
interfrequency interference may affect the results. Downlink compressed mode is not necessary
if the UE has dual receivers. In that case one receiver can perform interfrequency measurements
while the other handles the normal reception. Note however, that double receivers in the UE do
not remove the need for uplink compressed mode. If the uplink frequency is close enough to the
downlink frequency to be measured, then compressed mode must be employed in the uplink to
prevent interfrequency interference.

Reference: Introduction to 3G Mobile Communications - Juha Korhonen

  Why is secondary scrambling code needed?

For each primary scrambling code there is a set of 16 secondary scrambling codes. They can be
employed while transmitting channels that do not need to be received by everyone in the cell.
They should be used sparingly because channels transmitted with secondary scrambling codes
are not orthogonal to channels that use the primary scrambling code. One possible application
could be in sectored cells, where separate sectors do not have to be orthogonal to each other.

The secondary downlink scrambling codes can be applied with the exception of those common
channels that need to be heard in the whole cell and/or prior to the initial registration. Only one
scrambling code should be generally used per cell or sector to maintain the orthogonality
between different downlink code channels. With adaptive antennas the beams provide additional
spatial isolation and the orthogonality between different code channels is less important.
However, in all cases the best strategy is still to keep as many users as possible under a single
scrambling code to minimise downlink interference. If a secondary scrambling code needs to be
introduced in the cell, then only those users not fitting under the primary scrambling code
should use the secondary code. The biggest loss in orthogonality occurs when the users are
shared evenly between two different scrambling codes.

Reference:
Introduction to 3G Mobile Communications - Juha Korhonen
WCDMA for UMTS: Radio Access for Third Generation Mobile Communications - Harri
Holma




Back to FAQ


HOME




                             About Us Careers Contribute Advertise




                   Copyright ©2004-2005 3G4G.CO.UK. All rights reserved.
                       Contact info@3g4g.co.uk for further information

More Related Content

What's hot (20)

Harq
HarqHarq
Harq
 
Wcdma channels
Wcdma channelsWcdma channels
Wcdma channels
 
L2 MAC LTE PROCEDURES revC
L2 MAC LTE PROCEDURES revCL2 MAC LTE PROCEDURES revC
L2 MAC LTE PROCEDURES revC
 
Gsm interview question answer
Gsm interview question  answerGsm interview question  answer
Gsm interview question answer
 
Lecture intro to_wcdma
Lecture intro to_wcdmaLecture intro to_wcdma
Lecture intro to_wcdma
 
Wcdma physical layer
Wcdma physical layerWcdma physical layer
Wcdma physical layer
 
Wcdma presentation4
Wcdma presentation4Wcdma presentation4
Wcdma presentation4
 
Lte phy fundamentals
Lte phy fundamentalsLte phy fundamentals
Lte phy fundamentals
 
WCDMA
WCDMAWCDMA
WCDMA
 
08102014_Huawei handovers-handover-algo
08102014_Huawei handovers-handover-algo08102014_Huawei handovers-handover-algo
08102014_Huawei handovers-handover-algo
 
Wcdma
WcdmaWcdma
Wcdma
 
Radio Measurements in LTE
Radio Measurements in LTERadio Measurements in LTE
Radio Measurements in LTE
 
Wcdma channels
Wcdma channels Wcdma channels
Wcdma channels
 
Overview and Basics of LTE
Overview and Basics of LTEOverview and Basics of LTE
Overview and Basics of LTE
 
RACH procedure in LTE
RACH procedure in LTERACH procedure in LTE
RACH procedure in LTE
 
Basic of gsm by pawan
Basic of gsm by pawanBasic of gsm by pawan
Basic of gsm by pawan
 
GSM Idle Mode Behavior
GSM Idle Mode BehaviorGSM Idle Mode Behavior
GSM Idle Mode Behavior
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Gsm channels concept
Gsm channels conceptGsm channels concept
Gsm channels concept
 
2 g parameters_guidelines1
2 g parameters_guidelines12 g parameters_guidelines1
2 g parameters_guidelines1
 

Viewers also liked

Hardverek elnevezese
Hardverek elnevezeseHardverek elnevezese
Hardverek elnevezeseRóbert Moór
 
Slaidi premium medical_janvaris
Slaidi premium medical_janvarisSlaidi premium medical_janvaris
Slaidi premium medical_janvarisPremiumMedical
 
Prezentacja testowa
Prezentacja testowaPrezentacja testowa
Prezentacja testowagniewleone
 
Presentation of contents page images
Presentation of contents page imagesPresentation of contents page images
Presentation of contents page imagesLaurenNicole1993
 
DOCENTES SEDE CLARET
DOCENTES SEDE CLARETDOCENTES SEDE CLARET
DOCENTES SEDE CLARETprojavier
 
Презентация Толмачева Артема
Презентация Толмачева АртемаПрезентация Толмачева Артема
Презентация Толмачева АртемаDmitry Dok
 
The new watchtower of jw headquarters
The new watchtower of jw headquartersThe new watchtower of jw headquarters
The new watchtower of jw headquartersourbothy
 
EQUIPO DIRECTIVO COLIJA
EQUIPO DIRECTIVO COLIJAEQUIPO DIRECTIVO COLIJA
EQUIPO DIRECTIVO COLIJAprojavier
 
Informatika története
Informatika történeteInformatika története
Informatika történeteRóbert Moór
 
Ceilling structural works
Ceilling structural worksCeilling structural works
Ceilling structural worksAna-Maria Popa
 
Septembra piedavajums lv
Septembra piedavajums lvSeptembra piedavajums lv
Septembra piedavajums lvPremiumMedical
 

Viewers also liked (20)

Hardverek elnevezese
Hardverek elnevezeseHardverek elnevezese
Hardverek elnevezese
 
Slaidi premium medical_janvaris
Slaidi premium medical_janvarisSlaidi premium medical_janvaris
Slaidi premium medical_janvaris
 
Informatica
InformaticaInformatica
Informatica
 
Kummityttö Keniassa
Kummityttö KeniassaKummityttö Keniassa
Kummityttö Keniassa
 
Prezentacja testowa
Prezentacja testowaPrezentacja testowa
Prezentacja testowa
 
Radik
RadikRadik
Radik
 
Guacuri brasil web
Guacuri brasil webGuacuri brasil web
Guacuri brasil web
 
Presentation of contents page images
Presentation of contents page imagesPresentation of contents page images
Presentation of contents page images
 
Diavolo 2016
Diavolo 2016Diavolo 2016
Diavolo 2016
 
DOCENTES SEDE CLARET
DOCENTES SEDE CLARETDOCENTES SEDE CLARET
DOCENTES SEDE CLARET
 
Презентация Толмачева Артема
Презентация Толмачева АртемаПрезентация Толмачева Артема
Презентация Толмачева Артема
 
Janvaris ru 2012
Janvaris ru 2012Janvaris ru 2012
Janvaris ru 2012
 
The new watchtower of jw headquarters
The new watchtower of jw headquartersThe new watchtower of jw headquarters
The new watchtower of jw headquarters
 
EQUIPO DIRECTIVO COLIJA
EQUIPO DIRECTIVO COLIJAEQUIPO DIRECTIVO COLIJA
EQUIPO DIRECTIVO COLIJA
 
KU7 | Sara Räsänen
KU7 | Sara RäsänenKU7 | Sara Räsänen
KU7 | Sara Räsänen
 
Informatika története
Informatika történeteInformatika története
Informatika története
 
Prezentacja1 wk
Prezentacja1 wkPrezentacja1 wk
Prezentacja1 wk
 
Ceilling structural works
Ceilling structural worksCeilling structural works
Ceilling structural works
 
Premium Medical 03.11
Premium Medical 03.11Premium Medical 03.11
Premium Medical 03.11
 
Septembra piedavajums lv
Septembra piedavajums lvSeptembra piedavajums lv
Septembra piedavajums lv
 

Similar to Mobile Comm. - 3G Questions 2

WCDMA Air Interface
WCDMA Air InterfaceWCDMA Air Interface
WCDMA Air InterfaceSujeet Kumar
 
Wcdmahelp blogspot-com 3 g interview
Wcdmahelp blogspot-com 3 g interviewWcdmahelp blogspot-com 3 g interview
Wcdmahelp blogspot-com 3 g interviewBouziane Beldjilali
 
Q & A for 3G Optimization
Q & A for 3G Optimization Q & A for 3G Optimization
Q & A for 3G Optimization l3p15
 
EMERSON EDUARDO RODRIGUES wcdma-optimization-related-questions-m-com-academy
EMERSON EDUARDO RODRIGUES wcdma-optimization-related-questions-m-com-academyEMERSON EDUARDO RODRIGUES wcdma-optimization-related-questions-m-com-academy
EMERSON EDUARDO RODRIGUES wcdma-optimization-related-questions-m-com-academyEMERSON EDUARDO RODRIGUES
 
Umts interview questions
Umts interview questionsUmts interview questions
Umts interview questionsKaran Singh
 
Some Ccna basic detail
Some Ccna basic detailSome Ccna basic detail
Some Ccna basic detailmuneebalisyed
 
(SIB)System Information Blocks in LTE.docx
(SIB)System Information Blocks in LTE.docx(SIB)System Information Blocks in LTE.docx
(SIB)System Information Blocks in LTE.docxmahmoudsafaei1987
 
3D MIMO large-scale array antenna in 5G - C&T RF Antennas Inc
3D MIMO large-scale array antenna in 5G - C&T RF Antennas Inc3D MIMO large-scale array antenna in 5G - C&T RF Antennas Inc
3D MIMO large-scale array antenna in 5G - C&T RF Antennas IncAntenna Manufacturer Coco
 
LTE RACH Procedure
LTE RACH ProcedureLTE RACH Procedure
LTE RACH ProcedureAalekh Jain
 
5G PRACH Document-KPIs Improvemnt and understanding
5G PRACH Document-KPIs Improvemnt and understanding5G PRACH Document-KPIs Improvemnt and understanding
5G PRACH Document-KPIs Improvemnt and understandingQasimQadir3
 
Dt interview que
Dt interview queDt interview que
Dt interview queArun Kumar
 
Iaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdmaIaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdmaIaetsd Iaetsd
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batchJaimin Jani
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioIffat Anjum
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh meenamunesh
 

Similar to Mobile Comm. - 3G Questions 2 (20)

Basic of gsm anurag
Basic of gsm  anuragBasic of gsm  anurag
Basic of gsm anurag
 
WCDMA Air Interface
WCDMA Air InterfaceWCDMA Air Interface
WCDMA Air Interface
 
pbchwp
pbchwppbchwp
pbchwp
 
Wcdmahelp blogspot-com 3 g interview
Wcdmahelp blogspot-com 3 g interviewWcdmahelp blogspot-com 3 g interview
Wcdmahelp blogspot-com 3 g interview
 
Interview question 3g
Interview question 3gInterview question 3g
Interview question 3g
 
Q & A for 3G Optimization
Q & A for 3G Optimization Q & A for 3G Optimization
Q & A for 3G Optimization
 
EMERSON EDUARDO RODRIGUES wcdma-optimization-related-questions-m-com-academy
EMERSON EDUARDO RODRIGUES wcdma-optimization-related-questions-m-com-academyEMERSON EDUARDO RODRIGUES wcdma-optimization-related-questions-m-com-academy
EMERSON EDUARDO RODRIGUES wcdma-optimization-related-questions-m-com-academy
 
Umts interview questions
Umts interview questionsUmts interview questions
Umts interview questions
 
Some Ccna basic detail
Some Ccna basic detailSome Ccna basic detail
Some Ccna basic detail
 
(SIB)System Information Blocks in LTE.docx
(SIB)System Information Blocks in LTE.docx(SIB)System Information Blocks in LTE.docx
(SIB)System Information Blocks in LTE.docx
 
3D MIMO large-scale array antenna in 5G - C&T RF Antennas Inc
3D MIMO large-scale array antenna in 5G - C&T RF Antennas Inc3D MIMO large-scale array antenna in 5G - C&T RF Antennas Inc
3D MIMO large-scale array antenna in 5G - C&T RF Antennas Inc
 
New rough
New roughNew rough
New rough
 
LTE RACH Procedure
LTE RACH ProcedureLTE RACH Procedure
LTE RACH Procedure
 
Tems parameters
Tems parametersTems parameters
Tems parameters
 
5G PRACH Document-KPIs Improvemnt and understanding
5G PRACH Document-KPIs Improvemnt and understanding5G PRACH Document-KPIs Improvemnt and understanding
5G PRACH Document-KPIs Improvemnt and understanding
 
Dt interview que
Dt interview queDt interview que
Dt interview que
 
Iaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdmaIaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdma
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batch
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 

Mobile Comm. - 3G Questions 2

  • 1. FAQ on WCDMA Physical Layer (Layer 1) Edited By Zahid Ghadialy (zahidtg@yahoo.com) Last Updated: 18/08/2006 What happens when the Mobile is switched on? How does it find the Scrambling code to camp on? When the mobile The synchronization procedure starts with downlink SCH synchronization. The UE knows the SCH primary synchronization code, which is common to all cells. The slot timing of the cell can be obtained by receiving the primary synchronization channel (P-SCH) and detecting peaks in the output of a filter that is matched to this universal synchronization code. The slot synchronization takes advantage of the fact that the P-SCH is only sent during the first 256 chips of each slot. The whole slot is 2,560 chips long. This is depicted in Figure above. Thus the UE can determine when a slot starts, but it does not know the slot number yet (there are 15 slots in each frame), and thus it does not know where the radio frame boundary may be. Thereafter the UE correlates the received signal from the secondary synchronization channel (S- SCH) with all secondary synchronization codes (SSC), and identifies the maximum correlation value. The S-SCH is also only sent during the first 256 chips of every slot. One SSC is sent in every time slot. There are 16 different SSCs, and they can form 64 unique secondary SCH sequences. One sequence consists of 15 SSCs, and these sequences are arranged in such a way that in any nonzero cyclic shift less than 15 of any of the 64 sequences is not equivalent to some other sequence. This means that once the UE has identified 15 successive SSCs, it can determine the code group used as well as the frame boundaries (i.e., frame synchronization).
  • 2. Reference: Introduction to 3G Mobile Communications - Juha Korhonen What is RACH and how does it work? The Random Access Channel (RACH) is an uplink transport channel. The RACH is always received from the entire cell. The RACH is characterized by a collision risk and by being transmitted using open loop power control. The Random Access Channel (RACH) is typically used for signalling purposes, to register the terminal after power-on to the network or to perform location update after moving from one location area to another or to initiate a call. The structure of the physical RACH for signalling purposes is the same as when using the RACH for user data transmission. In UTRA the RACH procedure has the following phases: y The terminal decodes the BCH to find out the available RACH sub-channels and their scrambling codes and signatures. y The terminal selects randomly one of the RACH sub-channels from the group its access class allows it to use. Furthermore, the signature is also selected randomly from among the available signatures. y The downlink power level is measured and the initial RACH power level is set with the proper margin due to the open loop inaccuracy. y A 1 ms RACH preamble is sent with the selected signature. y The terminal decodes AICH to see whether the base station has detected the preamble. y In case no AICH is detected, the terminal increases the preamble transmission power by a step given by the base station, as multiples of 1 dB. The preamble is retransmitted in the next available access slot. y When an AICH transmission is detected from the base station, the terminal transmits the 10 ms or 20 ms message part of the RACH transmission. The RACH procedure is illustrated in Figure above, where the terminal transmits the preamble until acknowledgement is received on AICH, and then the message part follows. In the case of data transmission on RACH, the spreading factor and thus the data rate may vary; this is indicated with the TFCI on the DPCCH on PRACH. Spreading factors from 256 to 32 have been defined to be possible, thus a single frame on RACH may contain up to 1200 channel
  • 3. symbols which, depending on the channel coding, maps to around 600 or 400 bits. For the maximum number of bits the achievable range is naturally less than what can be achieved with the lowest rates, especially as RACH messages do not use methods such as macro-diversity as in the dedicated channel. Reference: WCDMA for UMTS: Radio Access for Third Generation Mobile Communications - Harri Holma What is the significance of SFN and CFN? SFN is the frame number used by the physical layer. CFN is the frame number used by the MAC layer. SFN is independent of the UE contexts, but associated with the Radio Link. CFN is associated with a UE context. The RRC layer maintains the mapping between CFN and various (for each RL) SFNs. What is compressed mode and is it necessary for the UE to support compressed mode? Compressed mode is needed if the UE needs to perform Inter-Frequency or Inter-RAT measurements. More details on what compressed mode is and how its performed can be seen in Compressed Mode Tutorial. Compressed Mode is performed in Uplink(UL) as well as in Downlink(DL). Uplink compressed mode must be used if the frequency to be measured is close to the uplink frequency used by the UTRAN air interface (i.e., frequencies in TDD mode/GSM 1800/1900 band). Otherwise interfrequency interference may affect the results. Downlink compressed mode is not necessary if the UE has dual receivers. In that case one receiver can perform interfrequency measurements while the other handles the normal reception. Note however, that double receivers in the UE do not remove the need for uplink compressed mode. If the uplink frequency is close enough to the downlink frequency to be measured, then compressed mode must be employed in the uplink to prevent interfrequency interference. Reference: Introduction to 3G Mobile Communications - Juha Korhonen Why is secondary scrambling code needed? For each primary scrambling code there is a set of 16 secondary scrambling codes. They can be employed while transmitting channels that do not need to be received by everyone in the cell. They should be used sparingly because channels transmitted with secondary scrambling codes are not orthogonal to channels that use the primary scrambling code. One possible application could be in sectored cells, where separate sectors do not have to be orthogonal to each other. The secondary downlink scrambling codes can be applied with the exception of those common channels that need to be heard in the whole cell and/or prior to the initial registration. Only one scrambling code should be generally used per cell or sector to maintain the orthogonality between different downlink code channels. With adaptive antennas the beams provide additional spatial isolation and the orthogonality between different code channels is less important.
  • 4. However, in all cases the best strategy is still to keep as many users as possible under a single scrambling code to minimise downlink interference. If a secondary scrambling code needs to be introduced in the cell, then only those users not fitting under the primary scrambling code should use the secondary code. The biggest loss in orthogonality occurs when the users are shared evenly between two different scrambling codes. Reference: Introduction to 3G Mobile Communications - Juha Korhonen WCDMA for UMTS: Radio Access for Third Generation Mobile Communications - Harri Holma Back to FAQ HOME About Us Careers Contribute Advertise Copyright ©2004-2005 3G4G.CO.UK. All rights reserved. Contact info@3g4g.co.uk for further information