SlideShare a Scribd company logo
1 of 3
Download to read offline
TSG-RAN Working Group 2 meeting #4 TSG R2#4(99)378
Berlin 25
th
– 28
th
May 1999
Agenda Item: 7.2
Source: CSELT
Title: Criteria for Soft Handover Algorithm
Document for: Discussion and Decision
____________________________________________________________________________________________________
1 Introduction
This document addresses the mechanisms of the Soft Handover and proposes an example of Soft
Handover algorithm.
2 Soft Handover Criteria
2.1 Soft Handover Parameters and definitions
Soft Handover is an handover in which the mobile station starts communication with a new BS on a
same carrier frequency, or sector of the same site (softer handover), performing utmost a change of
code. For this reason Soft Handover allows easily the provision of macrodiversity transmission; for
this intrinsic characteristic terminology tends to identify Soft Handover with macrodiversity even if
they are two different concepts; for its nature soft handover is used in CDMA systems where the
same frequency is assigned to adjacent cells. As a result of this definition there are areas of the UE
operation in which the UE is connected to a number of BSs. With reference to Soft Handover, the
“Active Set” is defined as the set of BSs the UE is simultaneously connected to (i.e., the UTRA
cells currently assigning a downlink DPCH to the UE constitute the active set).
The Soft Handover procedure is composed of a number of single functions:
• Measurements;
• Filtering of Measurements;
• Reporting of Measurement results;
• The Soft Handover Algorithm;
• Execution of Handover.
The reminder of the document focuses on the Soft Handover Algorithm. The measurements of the
monitored cells filtered in a suitable way constitute the basic input of the Soft Handover Agorithm.
In order to exhaustively describe the Soft Handover Algorithm the following definitions are
relevant:
“Candidate Set”: the cells that are not currently in the Active Set but have been received by the UE
with sufficient strength to indicate that the associated DPCH could be successfully demodulated.
“Neighbor Set”: the cells that are not currently in the Active Set or the Candidate Set but are likely
candidates for handoff.
Based on the measurements of the set of cells monitored, the Soft Handover function evaluates if
any BS should be added to (“add”), removed from (“drop”), or replaced in (“rep”) the Active Set;
performing than what is known as "Active Set Update" procedure.
For the description of the Soft Handover algorithm the definition of the following parameters is
needed:
AS_Th: Threshold for macro diversity;
AS_Th_Hyst: Hysteresis for the threshold;
AS_Rep_Hyst: Replacement Hysteresis;
AS_Max_Size: Maximum size of Active Set
The following figure describes the meaning of this parameters
AS_Th – AS_Th_Hyst
As_Rep_Hyst
As_Th + As_Th_Hyst
A Connected Add B Replace A with C Remove C
A
B
C
Time
Signal
Strength
∆T ∆T ∆T
Figure 1 shows the signal strenght of three different cells highlighting which of the BS belongs to the active Set
In order to explain Figure 1 the following definitions are used:
• Best_Ss :the highest measured cell present in the Active Set;
• Worst_Old_Ss: the lowest measured cell present in the Active Set;
• Best_Cand_Set:the highest measured cell present in the candidate set .
• Meas_Sign :the measured and filtered signal strength.
As described in Figure 1:
• If Meas_Sign is below (Best_Ss - As_Th - As_Th_Hyst) for a period of ∆T remove Worst BS in the
Active Set.
• If Meas_Sign is greater than (Best_Ss - As_Th + As_Th_Hyst) for a period of ∆T and the Active Set
is not full add Best BS outside the Active Set in the Active Set.
• If Active Set is full and Best_Cand_Ss is greater than (Worst_Old_Ss + As_Rep_Hyst) for a period of
∆T add best BS outside Active Set and Remove Worst BS in the Active Set.
2.2 Soft Handover Criteria
• In this section a detailed flow chart of a Soft Handover Algorithm based on the criteria described
above is presented. This algorithm uses as input the filtered measurements of the monitored cell.
Meas_Sign > Best_Ss
– As_Th –
as_Th_Hyst
for a period of ∆∆T
Yes
No
Remove Worst_Bs in
the Active Set
Meas_Sign > Best_Ss – As_Th
+ as_Th_Hyst
for a period of ∆∆T
No
Yes
Add Best_Bs in the Active
Set
Best_Cand_Ss > Worst_Old_Ss +
As_Rep_Hyst
for a period of ∆∆T
Yes
No
Active Set Full
No
Yes
Add Best BS in Active
Set and Remove Worst
Bs from th Active Set
Begin
3 Conclusions
This document presents an example of algorithm for the implementation of the Soft Handover Execution
and proposes to include this example as information in the proper sections in TR 25.922.

More Related Content

Viewers also liked (6)

Sepé Tiaraju
Sepé TiarajuSepé Tiaraju
Sepé Tiaraju
 
Ijdspfida
IjdspfidaIjdspfida
Ijdspfida
 
Votação de vereadores recife
Votação de vereadores recifeVotação de vereadores recife
Votação de vereadores recife
 
LA CRÓNICA 613
LA CRÓNICA 613LA CRÓNICA 613
LA CRÓNICA 613
 
7 de Setembro
7 de Setembro7 de Setembro
7 de Setembro
 
Navy_Evals
Navy_EvalsNavy_Evals
Navy_Evals
 

Similar to Softhandover criteria

Reducing False Positives - BSA AML Transaction Monitoring Re-Tuning Approach
Reducing False Positives - BSA AML Transaction Monitoring Re-Tuning ApproachReducing False Positives - BSA AML Transaction Monitoring Re-Tuning Approach
Reducing False Positives - BSA AML Transaction Monitoring Re-Tuning Approach
Erik De Monte
 
Wcdma rno parameters optimization
Wcdma rno parameters optimization Wcdma rno parameters optimization
Wcdma rno parameters optimization
Akaninyene Uko III
 
Iaetsd protecting privacy preserving for cost effective adaptive actions
Iaetsd protecting  privacy preserving for cost effective adaptive actionsIaetsd protecting  privacy preserving for cost effective adaptive actions
Iaetsd protecting privacy preserving for cost effective adaptive actions
Iaetsd Iaetsd
 

Similar to Softhandover criteria (20)

Reducing False Positives
Reducing False PositivesReducing False Positives
Reducing False Positives
 
Reducing False Positives - BSA AML Transaction Monitoring Re-Tuning Approach
Reducing False Positives - BSA AML Transaction Monitoring Re-Tuning ApproachReducing False Positives - BSA AML Transaction Monitoring Re-Tuning Approach
Reducing False Positives - BSA AML Transaction Monitoring Re-Tuning Approach
 
Wcdma rno parameters optimization
Wcdma rno parameters optimization Wcdma rno parameters optimization
Wcdma rno parameters optimization
 
Sdcch Blocking Analysis
Sdcch Blocking AnalysisSdcch Blocking Analysis
Sdcch Blocking Analysis
 
Support Vector Machine Optimal Kernel Selection
Support Vector Machine Optimal Kernel SelectionSupport Vector Machine Optimal Kernel Selection
Support Vector Machine Optimal Kernel Selection
 
Fpga implementation of run length encoding with new formulated codeword gener...
Fpga implementation of run length encoding with new formulated codeword gener...Fpga implementation of run length encoding with new formulated codeword gener...
Fpga implementation of run length encoding with new formulated codeword gener...
 
Iaetsd protecting privacy preserving for cost effective adaptive actions
Iaetsd protecting  privacy preserving for cost effective adaptive actionsIaetsd protecting  privacy preserving for cost effective adaptive actions
Iaetsd protecting privacy preserving for cost effective adaptive actions
 
report
reportreport
report
 
IRJET- Performance Analysis of Energy Efficient Clustering Protocol using TAB...
IRJET- Performance Analysis of Energy Efficient Clustering Protocol using TAB...IRJET- Performance Analysis of Energy Efficient Clustering Protocol using TAB...
IRJET- Performance Analysis of Energy Efficient Clustering Protocol using TAB...
 
solver (1)
solver (1)solver (1)
solver (1)
 
Solve Production Allocation and Reconciliation Problems using the same Network
Solve Production Allocation and Reconciliation Problems using the same NetworkSolve Production Allocation and Reconciliation Problems using the same Network
Solve Production Allocation and Reconciliation Problems using the same Network
 
Performance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkPerformance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor Network
 
Fuzzy Logic Controller for Modern Power Systems
Fuzzy Logic Controller for Modern Power SystemsFuzzy Logic Controller for Modern Power Systems
Fuzzy Logic Controller for Modern Power Systems
 
Multi-Objective Aspects of Distribution Network Volt-VAr Optimization
Multi-Objective Aspects of Distribution Network Volt-VAr OptimizationMulti-Objective Aspects of Distribution Network Volt-VAr Optimization
Multi-Objective Aspects of Distribution Network Volt-VAr Optimization
 
Performance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkPerformance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor Network
 
Hidalgo jairo, yandun marco 595
Hidalgo jairo, yandun marco 595Hidalgo jairo, yandun marco 595
Hidalgo jairo, yandun marco 595
 
paper11
paper11paper11
paper11
 
08102014_Huawei handovers-handover-algo
08102014_Huawei handovers-handover-algo08102014_Huawei handovers-handover-algo
08102014_Huawei handovers-handover-algo
 
AI Lesson 32
AI Lesson 32AI Lesson 32
AI Lesson 32
 
Lesson 32
Lesson 32Lesson 32
Lesson 32
 

Recently uploaded

scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Recently uploaded (20)

Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 

Softhandover criteria

  • 1. TSG-RAN Working Group 2 meeting #4 TSG R2#4(99)378 Berlin 25 th – 28 th May 1999 Agenda Item: 7.2 Source: CSELT Title: Criteria for Soft Handover Algorithm Document for: Discussion and Decision ____________________________________________________________________________________________________ 1 Introduction This document addresses the mechanisms of the Soft Handover and proposes an example of Soft Handover algorithm. 2 Soft Handover Criteria 2.1 Soft Handover Parameters and definitions Soft Handover is an handover in which the mobile station starts communication with a new BS on a same carrier frequency, or sector of the same site (softer handover), performing utmost a change of code. For this reason Soft Handover allows easily the provision of macrodiversity transmission; for this intrinsic characteristic terminology tends to identify Soft Handover with macrodiversity even if they are two different concepts; for its nature soft handover is used in CDMA systems where the same frequency is assigned to adjacent cells. As a result of this definition there are areas of the UE operation in which the UE is connected to a number of BSs. With reference to Soft Handover, the “Active Set” is defined as the set of BSs the UE is simultaneously connected to (i.e., the UTRA cells currently assigning a downlink DPCH to the UE constitute the active set). The Soft Handover procedure is composed of a number of single functions: • Measurements; • Filtering of Measurements; • Reporting of Measurement results; • The Soft Handover Algorithm; • Execution of Handover. The reminder of the document focuses on the Soft Handover Algorithm. The measurements of the monitored cells filtered in a suitable way constitute the basic input of the Soft Handover Agorithm. In order to exhaustively describe the Soft Handover Algorithm the following definitions are relevant: “Candidate Set”: the cells that are not currently in the Active Set but have been received by the UE with sufficient strength to indicate that the associated DPCH could be successfully demodulated. “Neighbor Set”: the cells that are not currently in the Active Set or the Candidate Set but are likely candidates for handoff.
  • 2. Based on the measurements of the set of cells monitored, the Soft Handover function evaluates if any BS should be added to (“add”), removed from (“drop”), or replaced in (“rep”) the Active Set; performing than what is known as "Active Set Update" procedure. For the description of the Soft Handover algorithm the definition of the following parameters is needed: AS_Th: Threshold for macro diversity; AS_Th_Hyst: Hysteresis for the threshold; AS_Rep_Hyst: Replacement Hysteresis; AS_Max_Size: Maximum size of Active Set The following figure describes the meaning of this parameters AS_Th – AS_Th_Hyst As_Rep_Hyst As_Th + As_Th_Hyst A Connected Add B Replace A with C Remove C A B C Time Signal Strength ∆T ∆T ∆T Figure 1 shows the signal strenght of three different cells highlighting which of the BS belongs to the active Set In order to explain Figure 1 the following definitions are used: • Best_Ss :the highest measured cell present in the Active Set; • Worst_Old_Ss: the lowest measured cell present in the Active Set; • Best_Cand_Set:the highest measured cell present in the candidate set . • Meas_Sign :the measured and filtered signal strength. As described in Figure 1: • If Meas_Sign is below (Best_Ss - As_Th - As_Th_Hyst) for a period of ∆T remove Worst BS in the Active Set.
  • 3. • If Meas_Sign is greater than (Best_Ss - As_Th + As_Th_Hyst) for a period of ∆T and the Active Set is not full add Best BS outside the Active Set in the Active Set. • If Active Set is full and Best_Cand_Ss is greater than (Worst_Old_Ss + As_Rep_Hyst) for a period of ∆T add best BS outside Active Set and Remove Worst BS in the Active Set. 2.2 Soft Handover Criteria • In this section a detailed flow chart of a Soft Handover Algorithm based on the criteria described above is presented. This algorithm uses as input the filtered measurements of the monitored cell. Meas_Sign > Best_Ss – As_Th – as_Th_Hyst for a period of ∆∆T Yes No Remove Worst_Bs in the Active Set Meas_Sign > Best_Ss – As_Th + as_Th_Hyst for a period of ∆∆T No Yes Add Best_Bs in the Active Set Best_Cand_Ss > Worst_Old_Ss + As_Rep_Hyst for a period of ∆∆T Yes No Active Set Full No Yes Add Best BS in Active Set and Remove Worst Bs from th Active Set Begin 3 Conclusions This document presents an example of algorithm for the implementation of the Soft Handover Execution and proposes to include this example as information in the proper sections in TR 25.922.