Ec/No is typically used as a quality metric for cellular links, but it can provide misleading information for HSDPA sessions. During an HSDPA session, the total received power (No) consists mainly of in-cell power from the HSDPA channel, causing Ec/No to appear low even when signal quality is good. Channel Quality Indicator (CQI) provides a better metric, as it directly reports the data rate the UE can support for a given channel quality. CQI maps received signal-to-interference-plus-noise ratio (SINR) to a transport block size and accounts for hybrid automatic repeat request (HARQ) to maintain a block error rate below 10%, allowing the node
On completion of the module one should be clear about the parameters required during drive test what does it mean and how much it is important.
Parameters regarding in windows like :
a) Current Channel
b) Radio parameters
c) Serving + Neighbors
Time: It is system time of computer.
Cell name: It displays the name of the sector which is serving according to the cellfile that is loaded in TEMS.
CGI : It stands for the Cell Global Identity which is unique for every sector of the site. It consists of MCC,MNC,LAC,CI.
Cell GPRS Support: Tells sector is having GPRS or not. Values are Yes or No .
Band : It tells in which Freq. Band mobile is operating e.g. GSM 900/ 1800.
BCCH ARFCN: It tells by which BCCH is the mobile station getting served.
TCH ARFCN: On which Traffic Freq. call is going on.
BSIC (Base Station Identity Code) : It is combination of Network Color Code (NCC) (0 – 7) & Base Station Color Code (BCC) (0 – 7). e.g. 62. It is decoded by mobile on every Sync. Channel Message.
Mode: It is shows in which state is mobile operating, Idle, Dedicated & Packet.
Time slot: On which time slot of current TCH call is going on. Viz. time slot no. of TRX.
Physical channel - Each timeslot on a carrier is referred to as a physical channel. Per carrier there are 8 physical channels.
Logical channel - Variety of information is transmitted between the MS and BTS. There are different logical channels depending on the information sent. The logical channels are of two types
Traffic channel
Control channel
BCH Channels
BCCH( Broadcast Control Channel )
Downlink only
Broadcasts general information of the serving cell called System Information
BCCH is transmitted on timeslot zero of BCCH carrier
Read only by idle mobile at least once every 30 secs.
SCH( Synchronisation Channel )
Downlink only
Carries information for frame synchronisation. Contains TDMA frame number and BSIC.
FCCH( Frequency Correction Channel )
Downlink only.
Enables MS to synchronise to the frequency.
Also helps mobiles of the ncells to locate TS 0 of BCCH carrier.
RACH( Random Access Channel )
Uplink only
Used by the MS to access the Network.
AGCH( Access Grant Channel )
Downlink only
Used by the network to assign a signalling channel upon successfull decoding of access bursts.
PCH( Paging Channel )
Downlink only.
Used by the Network to contact the MS.
On completion of the module one should be clear about the parameters required during drive test what does it mean and how much it is important.
Parameters regarding in windows like :
a) Current Channel
b) Radio parameters
c) Serving + Neighbors
Time: It is system time of computer.
Cell name: It displays the name of the sector which is serving according to the cellfile that is loaded in TEMS.
CGI : It stands for the Cell Global Identity which is unique for every sector of the site. It consists of MCC,MNC,LAC,CI.
Cell GPRS Support: Tells sector is having GPRS or not. Values are Yes or No .
Band : It tells in which Freq. Band mobile is operating e.g. GSM 900/ 1800.
BCCH ARFCN: It tells by which BCCH is the mobile station getting served.
TCH ARFCN: On which Traffic Freq. call is going on.
BSIC (Base Station Identity Code) : It is combination of Network Color Code (NCC) (0 – 7) & Base Station Color Code (BCC) (0 – 7). e.g. 62. It is decoded by mobile on every Sync. Channel Message.
Mode: It is shows in which state is mobile operating, Idle, Dedicated & Packet.
Time slot: On which time slot of current TCH call is going on. Viz. time slot no. of TRX.
Physical channel - Each timeslot on a carrier is referred to as a physical channel. Per carrier there are 8 physical channels.
Logical channel - Variety of information is transmitted between the MS and BTS. There are different logical channels depending on the information sent. The logical channels are of two types
Traffic channel
Control channel
BCH Channels
BCCH( Broadcast Control Channel )
Downlink only
Broadcasts general information of the serving cell called System Information
BCCH is transmitted on timeslot zero of BCCH carrier
Read only by idle mobile at least once every 30 secs.
SCH( Synchronisation Channel )
Downlink only
Carries information for frame synchronisation. Contains TDMA frame number and BSIC.
FCCH( Frequency Correction Channel )
Downlink only.
Enables MS to synchronise to the frequency.
Also helps mobiles of the ncells to locate TS 0 of BCCH carrier.
RACH( Random Access Channel )
Uplink only
Used by the MS to access the Network.
AGCH( Access Grant Channel )
Downlink only
Used by the network to assign a signalling channel upon successfull decoding of access bursts.
PCH( Paging Channel )
Downlink only.
Used by the Network to contact the MS.
Ericsson’s proprietary Lean Carrier innovation is first to address intercell signaling interference, introducing lean design concepts to 4G LTE to improve data speed and app coverage for users while on the road to 5G.
Engineer EMERSON EDUARDO RODRIGUES PRESENTA UNA NUEVA VERSION
THERE ONE NEW ONE PRESENTATION FOR 2G AND 3G ENGINEERING FOR LTE AND PSCORE ENGINEER
ITS VERY SUITABLE FOR YOUR RESEARCH AT ALL LEVELS OF RF ENGINEERING AND PS CS
In this paper two active power filters used for the
resonance damping in power distribution lines are compared.
Both filters effectively damp the harmonic resonance but the filter
designed by the authors avoids the calculation of the
characteristic impedance of the distribution line, so proving an
higher robustness. Moreover the numerical results obtained with
the Simplorer simulation software clearly demonstrate that the
designed filter is more efficient since it is faster, as it requires only
3 cycles of the fundamental frequency to damp the resonance, and
it decreases deeper the power losses along the power distribution
line.
A low power cmos analog circuit design for acquiring multichannel eeg signalsVLSICS Design
EEG signals are the signatures of neural activities and are captured by multiple-electrodes and the signals are recorded from pairs of electrodes. To acquire these multichannel signals a low power CMOS circuit was designed and implemented. The design operates in weak inversion region employing sub threshold
source coupled logic. A 16 channel differential multiplexer is designed by utilizing a transmission gate with
dynamic threshold logic and a 4 to 16 decoder is used to select the individual channels. The ON and OFF
resistance of the transmission gate obtained is 27 ohms and 10 M ohms respectively. The power dissipation
achieved is around 337nW for a dynamic range of 1μV to 0.4 V.
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Snsijwmn
Energy consumption is an important parameter in th
e context of the wireless sensor networks (WSNs).
Several factors can cause energy over consumption s
uch as mobility, node position (relay or gateway),
retransmissions... In this paper, we described a ne
w Energy-Degree Distance(EDD) Clustering Algorithm
for the WSNs. A node with higher residual energy,
higher degree and closer to the base station is mor
e
likely elected as a clusterhead (CH). The inter clu
ster and intra cluster communications are realized
on one
hop. The principal goal of our algorithm is to min
imize the energy consumption and balance energy
consumption among all nodes. By comparing EDD clust
ering algorithm with LEACH algorithm,
simulation results have shown its effectiveness i
n saving energy
Performance improvement of parallel active power filters using droop control ...Ghazal Falahi
In this paper, a new method based on droop control scheme is proposed for controlling parallel operation of active filters. The harmonic components of the load current are extracted by an enhanced phase-locked loop (EPLL). In the parallel group, each filter operates as a conductance and the harmonic workload is shared among them. A droop relationship between the conductance and non-fundamental apparent power controls the operation of each unit. The non-fundamental apparent power has been calculated based on IEEE Std 1459. Principles of operation are explained in this paper and simulation results which are presented approve the effectiveness of this method. The results indicate a significant reduction in Total Harmonic Distortion (THD) in a rectifier application.
Highly -increasing requirement for mobile and several electronic devices want the use of VLSI circuits which are highly power efficient. The most primitive arithmetic operation in processors is addition and the adder is the most highly used arithmetic component of the processor. Carry Select Adder (CSA) is one of the fastest adders and the structure of the CSA shows that there is a possibility for increasing its efficiency by reducing the power dissipation and area in the CSA. This research paper presents power and delay analysis of various adders and proposed a 32-bit CSA that is implemented using variable size of the combination of adders, thus the proposed Carry select Adder (CSA) which has minimum Delay, and less power consumption hence improving the efficiency and speed of the Carry Select Adder.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
2. Why CQI-Related Questions answered
Q: Why do we get poor Ec/No when conducting HSDPA Drive Test?
Q: What is the calculation behind Ec/No going low when HSDPA session
is initiated?
Q: Why do we consider CQI as a Quality Metric when conducting HSDPA
Drive Test instead of Ec/No?
Lets a look on the drive test in the next slide_____
3. Note the CQI value is 27 (good) while EcNo about to explode (-12dB)
4. Lets start with some basics.
Ec/No for most of you is a Quality & Capacity measuring Metric.
It generally gives us the idea how good or bad the link Quality is.
However, by definition ,its quite confusing-
CPICH Ec/No=Pilot channel quality energy per chip over total
received power spectral density.
OR
RSCP=RSSI + Ec/No
Ec/No =RSCP-RSSI Quite confusing««.
OK
5. Let¶s go back to some developing Basics.
RSCP. The Received Signal Code Power: That¶s the power level the pilot channel
of a cell is received with and usually expressed in dBm (mW on a logarithmic scale).
With this parameter, different cells using the same carrier can be compared and
handover or cell reselection decisions can be taken.
RSSI. In UMTS that¶s the signal power over the complete 5 MHz carrier which includes
all components received, including the signals from the current and neighboring cells
on the same frequency. In an isolated cell having only CPICH power to transmit and with
none of the other channels utilized, the effective RSSI can be seen by the UE would be
(fraction of) PCPICH power. However RSSI changes when the 5MHz carrier will carry
power for other dedicated or control channels. In that case, the effective power perceived
By the UE would be the transmitted power of the serving cell + the power transmitted by
neighbor cells over the same carrier frequency.
EcNo. That¶s the received energy per chip (Ec) of the pilot channel divided by the total
noise power density (No). In other words the EcNo is the RSCP divided by the RSSI. And
Again in other words: The better this value the better can a signal of a cell be distinguished
from the overall noise. The EcNo is usually expressed in dB as it¶s a relative value. The
value is negative as the RSCP is smaller than the total received power. As the RSCP this
Value can be used to compare different cells on the same carrier and handover or cell
reselection decisions can be taken.
6. It is believed that Ec/No is an expression of signal-to noise ratio and is
therefore, an indicator of signal quality.
Misconception about Ec/No
IT IS NOT (JUST THAT)
The ³No´ consists of three things: interfering (non orthogonal) power, thermal
noise and non-interfering (orthogonal power).
In situations where No consists mainly of ³in-cell´ power (e.g., during
HS-DSCH bursts), Ec/No can be ³low´ , whereas the objective signal
quality is high. This will be shown in the following slides.
7. Misconception about Ec/No
Further, Ec is an expression of power in the CPICH, not in the downlink
DPxCH.
Though the dynamic range of downlink DPxCH power is often expressed
relative to the CPICH, downlink power control will do its best to ensure that
downlink SNR is whatever it needs to be to meet the transport channel
quality target.
The point being: The traffic channel SNR has almost nothing to do with
pilot Ec/No.
It is also to be noted that UE is only capable of receiving Pilot RSCP and
RSSI on the carrier. Ec/No is calculated by the UE by the formula
(RSCP-RSSI) and sent in the UL.
8. Still confusion««
For the sake of simplicity, just imagine that you are in a test-bed, being
served by a single cell.
Then,
Ec/No for a UE is
9. Hope you¶re able to make a picture of how Ec/No works then proceed for
what happens when a HSDPA session is initiated«.
Cell power distribution
Let¶s take a look at how the POWER of a CELL is distributed among
different channels.
For simplicity, check the diagram
Notice that HSDPA uses
the remaining power of the
cell after power is allocated
to Common & Dedicated
channels (check more detail
In next slide).
10. Cell power distribution
Without HSDPA With HSDPA
From the figure
1) Common channels have the highest priority for power. Their power is fixed.
2) DCH come second in priority ± Power control is applicable.
3) All the remains after DCH utilization can be used up for HSDPA power.
4) So, If a cell is less loaded , a single UE HS session can utilize the whole
HSDPA power space which is lying unused.
11. Ec/No computation ± No load
‡ Now imagine yourself conducting a test in Test Bed on a cell having
zero DCH or HS traffic.
‡ Assuming only 10% cell power is dedicated to CPICH( 33dBm=2watt).
‡ Cell MAXTXPOWER is 20W or 43dBm.
‡ Ideally, if you have no traffic on this cell, your UE will calculate the CPICH
Ec/No in the following manner
12. Ec/No computation ± One HSDPA user
‡ Now assume you start an HS session. Since there is no DCH traffic, all the
REMNANT power is given to HSDPA.
‡ Cell Transmit power is now 2W for CPICH and REMNANT power (18W) for
HSDPA ± so ideally, Cell is utilizing almost 100% power.
‡ So, UE will measure the Ec/No in the following manner.
13. Why CQI««.
From above computations we establish the following conclusion..
1. In Idle mode and with no resources allocated, a UE will measure as
low as 0 dB Ec/No.
2. In HS Mode and with no resources allocated on DCH, a UE will
measure as low as -10dB. It cannot report ANY better than -10 dB.
What you may be asking yourself?
1.What happens when more users join in to share
the REMNANT power?
2.Will Ec/No improve or degrade further with
addition of DCH or HS user?
Hence, it means in a live network when resources of cell are shared b/n
many users, and Interference from other cells also plays its part, the
Ec/No will always give a FALSE value for an HSDPA user .And, it will
show a poor value.
14. Conclusion««
‡ So, what is the ALTERNATIVE to Ec/No in HS session ?
‡ Its called Channel Quality Indication.
CQI
Why CQI««.
15. What is CQI ?
‡ HSDPA utilizes link adaptation techniques to substitute power control and variable
spreading factor.
‡ The HS-DSCH link-adaptation algorithm at the Node-B is very dynamic, and adjusts
the transmit bit rate on the HS-DSCH every 2-ms TTI.
‡ The UE periodically sends a CQI to the serving HS-DSCH cell on the uplink high-
speed dedicated physical control channel (HS-DPCCH). In addition to CQI, UE
also sends HARQ on HS-DPCCH.
‡ The CQI tells the NodeB scheduler, the data rate the UE expects to be able to
receive at a given point in time.
NOTE: The HSDPA system defines a different CQI mapping table for different categories of
UEs. The category is defined according to the capability of UE.
16. HSDPA ± CQI involvement
Below figure shows the steps how CQI helps in determining the initial throughput
that a UE terminal demands from the system.
STEPS.
‡ SINR is used to evaluate the channel quality as observed by the receiver,
where a standard single antenna RAKE is used because it is the most
common in the SISO HSDPA terminals.
‡ CQI value for a given SINR is done via a linear mapping, as shown in figure.
17. HSDPA ± CQI involvement
STEPS.
‡ The CQI values are used by the link adaptation algorithm at the node- B.
Every CQI value reported corresponds to the TRANSPORT BLOCK SIZE
(TBS) that can be granted on a particular Modulation type and number of
codes.
‡ Example of a UE category 10 CQI values from 0 to 30 are shown in
figure. Other UE categories are shown in the following slide.
‡ The CQI is further defined as the TBS that can be supported with a BLER
no greater than 10%.
18. STEPS.
‡ When CQI is sending UE¶s requirement to the system in UL, there is BLER
calculation going on and UL HARQ (Hybrid Auto Repeat Request)
mechanism is helping in maintaining the BLER to below 10%.
‡ So the system (NodeB) is essentially calculating the Data Rate to be scheduled
to the user based on CQI reports and BLER which it receives from the UE
‡ So DATA RATE (bps)= TBS (bits)/TTI (sec)*(1-BLER)