The document summarizes key aspects of the WCDMA physical layer. It discusses spreading and scrambling which increase signal bandwidth using channelization and scrambling codes. It describes transport channels which define how data is transferred physically, including dedicated and common channels. It also outlines physical channels such as the dedicated physical data and control channels for both uplink and downlink transmissions.
This presentation discusses about the WCDMA air Interface used in 3G i.e. UMTS. This Radio Interface has great capability on which Third Generation of Mobile Communication is built, with backward compatibility.
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
The spectrum available for the wireless services is limited, the increased demand of wireless
application has put a lot of limitations on the utilization of available radio spectrum. For the efficient spectrum
utilization for wireless application IEEE 802.22 standard i.e. WRAN (Wireless Regional Area Network) is
developed which is based on cognitive radio technique that senses the free available spectrum. It allows sharing
of geographically unused channels allocated to the TV Broadcast Service, without interference.
In this paper we are evaluating the performance of WRAN over physical layer with QPSK, 16-QAM
and 64-QAM modulation with Convolution coding with code rate of 1/2, 2/3, 3/4, 5/6 and obtaining the BER
curves for rician channel. Simulation is performed in MATLAB
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
Abstract: The spectrum available for the wireless services is limited, the increased demand of wireless application has put a lot of limitations on the utilization of available radio spectrum. For the efficient spectrum utilization for wireless application IEEE 802.22 standard i.e. WRAN (Wireless Regional Area Network) is developed which is based on cognitive radio technique that senses the free available spectrum. It allows sharing of geographically unused channels allocated to the TV Broadcast Service, without interference. In this paper we are evaluating the performance of WRAN over physical layer with QPSK, 16-QAM and 64-QAM modulation with Convolution coding with code rate of 1/2, 2/3, 3/4, 5/6 and obtaining the BER curves for rician channel. Simulation is performed in MATLAB. Keywords - CC, CP, CR, OFDMA, PHY Layer, WRAN
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
Abstract: The spectrum available for the wireless services is limited, the increased demand of wireless
application has put a lot of limitations on the utilization of available radio spectrum. For the efficient spectrum
utilization for wireless application IEEE 802.22 standard i.e. WRAN (Wireless Regional Area Network) is
developed which is based on cognitive radio technique that senses the free available spectrum. It allows sharing
of geographically unused channels allocated to the TV Broadcast Service, without interference.
In this paper we are evaluating the performance of WRAN over physical layer with QPSK, 16-QAM
and 64-QAM modulation with Convolution coding with code rate of 1/2, 2/3, 3/4, 5/6 and obtaining the BER
curves for rician channel. Simulation is performed in MATLAB.
Keywords - CC, CP, CR, OFDMA, PHY Layer, WRAN
My first comprehensive wlan presentation in the draft-11n days in 2008.
Note: Lots of text and pictures are used from across the web, author doesn't claim any copyright on them. In case of issues/feedback please email: chaitanya.mgit@gmail.com
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...Journal For Research
Wireless designers constantly seek to improve the spectrum efficiency/capacity, coverage of wireless networks and link reliability. In this direction, Space-time wireless technology that uses multiple antennas along with appropriate signaling and receiver techniques that offers a powerful tool for improving the wireless performance is used in this thesis work. A special version of STBC called ‘Alamouti code’ is used. PSK modulation scheme is used for modulation of data. In this thesis work, the Space-Time Block Codes (STBC) is used in WLAN wireless network that uses multiple numbers of antennas at both transmitter and receiver. The STBC which includes the Alamouti Scheme for 2 transmit antenna and a different number of receiving antenna has been studied, simulated and analyzed. The simulation has been done in MATLAB. Throughput and several parameter performance has been analyzed using the MATLAB.A sample image is transmitted to compare the performance of various parameters like RMSE, PSNR, MAE etc. All the parameters are plotted against SNR (in dB) values ranging from -18 to 30. Various observations being made for the improvement in various parameters with increasing SNR and/or with changing diversity scheme. AWGN channel is used here for communication of sampled image data.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
For spreading factor & channels
1. WCDMA Physical Layer (Chapter 6)
Peter Chong, Ph.D. (UBC, Canada)
Research Engineer
Nokia Research Center, Helsinki, Finland
1 26.01.2002 WCDMA Phys ical Layer
2. Introduction
• This lecture presents a general WCDMA or UTRA (Universal
Terrestrial Radio Access) FDD (Frequency Division Duplex)
physical layer issues.
• Spreading and Scrambling Mapping
• Transport Channels to
• Physical Channels
• Signaling
• Physical Layer Procedures
2 26.01.2002 WCDMA Phys ical Layer
3. Some Parameters of WCDMA Physical Layer
Carrier Spacing 5 MHz (nominal)
Chip Rate 3.84 Mcps
Frame Length 10 ms (38400 chips)
No. of slots/frame 15
No. of chips/slot 2560 chips (Max. 2560 bits)
Uplink SF 4 to 256
Downlink SF 4 to 512
Channel Rate 7.5 Kbps to 960 Kbps
3 26.01.2002 WCDMA Phys ical Layer
5. Spreading Operation
• Spreading means increasing the signal bandwidth
• Strickly speaking, spreading includes two operations:
• Channelisation (increases signal bandwidth) - using orthogonal
codes
• Scrambling (does not affect the signal bandwidth) - using pseudo-
noise codes
channelization codes (SF) scrambling codes
Data
bit rate chip rate chip rate
5 26.01.2002 WCDMA Phys ical Layer
6. Channelisation (1/3)
• Channelisation codes are orthogonal codes, based on Orthogonal
Variable Spreading Factor (OVSF) technique
• The codes are fully orthogonal, i.e., they do not interfere with each
other, only if the codes are time synchronized
• Thus, channelisation codes can separate the transmissions from a
single source
• In the downlink, it can separate different users within one cell/sector
• Limited orthogonal codes must be reused in every cell
• Problem: Interference if two cells use the same code
• Solution: Scrambling codes to reduce inter-base-station interference
6 26.01.2002 WCDMA Phys ical Layer
7. Channelisation (2/3)
• In the uplink, it can only separate the physical channels/services of one
user because the mobiles are not synchronised in time.
• It is possible that two mobiles are using the same codes.
• In order to separate different users in the uplink, scrambling codes are
used.
• The channelisation codes are picked from the code tree as shown in
next slide.
• One code tree is used with one scrambling code on top of the tree.
• If c4,4 is used, no codes from its subtree can be used (c8,7 , c8,8 , …).
7 26.01.2002 WCDMA Phys ical Layer
8. Channelisation (3/3)
Code tree
c4,1=(1,1,1,1) c8,1
c2,1=(1,1) c8,2
c4,2=(1,1,-1,-1) c8,3
c1,1=(1) c8,4
(c,c) c4,3=(1,-1,1,-1) c8,5
...
(c)
c8,6
c4,4=(1,-1,-1,1) c8,7
c2,2=(1,-1)
(c,-c) c8,8
S F =1 S F =2 S F =4 S F =8 ...
8 26.01.2002 WCDMA Phys ical Layer
9. Scrambling
• In the scrambling process the code sequence is multiplied with a
pseudorandom scrambling code.
• The scrambling code can be a long code (a Gold code with 10 ms
period) or a short code (S(2) code).
• In the downlink scrambling codes are used to reduce the inter-base-
station interference. Typically, each Node B has only one scrambling
code for UEs to separate base stations. Since a code tree under one
scrambling code is used by all users in its cell, proper code
management is needed.
• In the uplink scrambling codes are used to separate the terminals.
9 26.01.2002 WCDMA Phys ical Layer
10. Summary
Channelisation code Scrambling code
Usage UL: Separation of physcial data UL: Separation of terminals
and control channels from same UE DL: Separation of
DL: Seperation of different users cells/sectors
within one cell
Limited codes in each
cell for DL.
Length UL:4 – 256 chips same as SF UL: 10ms=38400 chips
DL:4 – 512 chips same as SF 38400
DL: 10ms=38499 chips
No. of No. of codes under one scrambling UL: Several millions
codes code = SF DL: 512
Code Orthogonal Variable Spreading Long 10ms code: Gold code
family Factor Short code: Extended S(2)
code family
Spreading Yes, increase transmission No, does not affect
bandwidth transmission bandwidth
10 26.01.2002 WCDMA Phys ical Layer
12. Channel Concepts
• Three separate channels concepts in the UTRA: logical, transport, and
physical channels.
• Logical channels define what type of data is transferred.
• Transport channels define how and with which type of characteristics the
data is transferred by the physical layer.
• Physical data define the exact physical characteristics of the radio channel.
RLC layer
Logical Channel L2
MAC layer
Transport Channel
PHY layer L1
Physical Channel
12 26.01.2002 WCDMA Phys ical Layer
13. Transport Channels -> Physical Channels
(1/3)
• Transport channels contain the data generated at the higher layers,
which is carried over the air and are mapped in the physical layer to
different physical channels.
• The data is sent by transport block from MAC layer to physical layer
and generated by MAC layer every 10 ms.
• The transport format of each transport channel is identified by the
Transport Format Indicator (TFI), which is used in the interlayer
communication between the MAC layer and physical layer.
• Several transport channels can be multiplexed together by physical
layer to form a single Coded Composite Transport Channel
(CCTrCh).
13 26.01.2002 WCDMA Phys ical Layer
14. Transport Channels -> Physical Channels
(2/3)
• The physical layer combines several TFI information into the
Transport Format Combination Indicator (TFCI), which indicate
which transport channels are active for the current frame.
• Two types of transport channels: dedicated channels and common
channels.
• Dedicated channel –reserved for a single user only.
• Support fast power control and soft handover.
• Common channel – can be used by any user at any time.
• Don’t support soft handover but some support fast power control.
• In addition to the physical channels mapped from the transport
channels, there exist physical channels for signaling purposes to
carry only information between network and the terminals.
14 26.01.2002 WCDMA Phys ical Layer
15. Transport Channels -> Physical Channels (3/3)
Transport Channel Physical Channel
(UL/DL) Dedicated channel DCH Dedicated physical data channel DPDCH
Dedicated physical control channel DPCCH
(UL) Random access channel RACH Physical random access channel PRACH
(UL) Common packet channel CPCH Physical common packet channel PCPCH
(DL) Broadcast channel BCH Primary common control physical channel P-CCPCH
(DL) Forward access channel FACH Secondary common control physical channel S-CCPCH
(DL) Paging channel PCH
(DL) Downlink shared channel DSCH Physical downlink shared channel PDSCH
Synchronisation channel SCH
Common pilot channel CPICH
Signaling physical channels Acquisition indication channel AICH
Paging indication channel PICH
CPCH Status indication channel CSICH
Collision detection/Channel assignment indicator channel
CD/CA-ICH
15 26.01.2002 WCDMA Phys ical Layer
16. UL Dedicated Channel DCH (1/3)
• Due to audible interference to the audio equipment caused from the
discontinuous UL transmission, two dedicated physical channels are
I-Q/code multiplexing (called dual-channel QPSK modulation)
instead of time multiplexing.
Data (DPDCH) DTX Period Data (DPDCH)
Layer 1 Control Information (DPCCH)
channelization code, cD complex
scrambling code
Data
(DPDCH)
I+jQ
Control
(DPDCH)
*j
BPSK for each channel
channelization code, cC
16 26.01.2002 WCDMA Phys ical Layer
17. UL Dedicated Channel DCH (2/3)
• Dedicated Physical Control Channel (DPCCH) has a fixed spreading factor
of 256 and carries physical layer control information.
• DPCCH has four fields: Pilot, TFCI, FBI, TPC.
Pilot – channel estimation + SIR estimate for PC
TFCI – bit rate, channel decoding, interleaving parameters for every
DPDCH frame
FBI (Feedback Information) – transmission diversity in the DL
TPC (Transmission Power Control) – power control command
2560 chips
DPDCH Data
DPCCH PILOT TFCI FBI TPC
Uplink DPCH 0 1 2 14
10 ms
17 26.01.2002 WCDMA Phys ical Layer
18. UL Dedicated Channel DCH (3/3)
•Dedicated Physical Data Channel (DPDCH) has a spreading factor
from 4 to 256 and its data rate may vary on a frame-by-frame basis.
•Parallel channel codes can be used in order to provide 2 Mbps user
data
DPDCH SF DPDCH channel Max. user data rate with ½
bit rate (kbps) rate coding (approx.)
256 15 7.5 kbps
128 30 15 kbps
3.84 Mcps/256=15 kbps 64 60 30 kbps
32 120 60 kbps
16 240 120 kbps
8 480 240 kbps
4 960 480 kbps
4, with 6 parallel codes 5740 2.3 Mbps
18 26.01.2002 WCDMA Phys ical Layer
20. DL Dedicated Channel DCH (1/3)
• In the DL no audible interference is generated with DTX because the
common channels are continuously transmitting.
• Downlink DCH is transmitted on the Downlink Dedicated Physical
Channel (Downlink DPCH); thus, DPCCH and DPDCH are time-
multiplexed and using normal QPSK modulation.
No FBI
2560 chips
DPCCH DPDCH DPCCH DPDCH DPCCH
Slot TPC DATA TFCI DATA PILOT
Downlink
0 1 2 14
DPCH
10 ms
20 26.01.2002 WCDMA Phys ical Layer
21. DL Dedicated Channel DCH (2/3)
• A code tree under one scrambling code is shared by several users. Normally,
one scrambling code and thus only one code tree is used per sector in the BS.
• DCH SF does not vary on a frame-by-frame basis; thus, data rate is varied by
rate matching operation, puncturing or repeating bits, or with DTX, where the
transmission is off during part of the slot.
• The SF is the same for all the codes with multicode transmission.
Downlink DPCH slot
A full rate TFCI TrCh A TPC TrCh B PILOT
A half rate TFCI TrCh A DTX TPC TrCh B PILOT
21 26.01.2002 WCDMA Phys ical Layer
22. DL Dedicated Channel DCH (3/3)
• UL DPDCH consists of BPSK symbols whereas DL DPDCH consists of QPSK
symbols. The bit rate in the DL DPDCH can be almost double that in the UL
DPDCH.
Spreading factor Channel Channel DPDCH channel Max. user data rate
symbol rate bit rate bit rate range with ½ rate coding
(kbps) (kbps) (kbps) (approx.)
512 7.5 15 3-6 1-3 kbps
256 15 30 12-24 6-12 kbps
128 30 60 42-51 20-24 kbps
64 60 120 90 45 kbps
32 120 240 210 105 kbps
16 240 480 432 215 kbps
8 480 960 912 456 kbps
4 960 1920 1872 936 kbps
4, with 3 parallel 2880 5760 5616 2.3 Mbps
codes
22 26.01.2002 WCDMA Phys ical Layer
24. Downlink Shared Channel (DSCH)
• Used for dedicated control or traffic data (bursty traffic).
• Shared by several users. Each user may allocate a DSCH for a short
period of time based on a particular packet scheduling algorithm.
• Support the use of fast power control, but not soft-handover.
• Use a variable spreading factor on a frame-by-frame basis so that bit
rate can be varied on a frame-by-frame basis.
• Associated with a DL DPCH with the use of DPCCH. Such a DL
DPCCH from TFCI provides the power control information, an
indication to which terminal to decode the DSCH and spreading
code of the DSCH.
• Since the information of DSCH is provided from an associated DL
DPCH, the PDSCH frame may not be started before 3 slots after the
end of that associated DL DPCH.
24 26.01.2002 WCDMA Phys ical Layer
25. Random Access Channel (RACH)
• A contention-based uplink transport channel; thus, no scheduling is
performed.
• Use of RACH
• Carry control information from the UE to set up an initial
connection. For example, to register the UE after power-on to the
network or to perform location update or to initiate a call.
• Send small amount of packet data to network for 1 to 2 frames.
• Since it is needed to be heard from the whole cell for signaling
purposes, the data rate is quite low.
• No power control is supported.
25 26.01.2002 WCDMA Phys ical Layer
26. RACH Operation
• First, UE sends a preamble.
• The SF of the preamble is 256 and contain a signature sequence of 16
symbols – a total length of 4096 chips.
• Wait for the acknowledged with the Acquisition (AICH) from the BS.
• In case no AICH received after a period of time, the UE sends another
preamble with higher power.
• When AICH is received, UE sends 10 or 20 ms message part.
• The SF for the message is from 32 to 256.
BS
UE
RACH Preamble AICH Preamble RACH Message
26 26.01.2002 WCDMA Phys ical Layer
27. Common Packet Channel (CPCH)
• A contention-based uplink transport channel for transmission of
bursty data traffic.
• Different from RACH, channel can be reserved for several frames
and it uses fast power control.
• Information of CPCH is provided by
• DL DPCCH for fast power control information.
• Forward Access Channel (FACH) for higher layer DL signaling.
• CPCH operation is similar to RACH operation except that it has
Layer 1 Collision Detection (CD).
• In RACH, one RACH message is lost, whereas in CPCH an
undetected collision may lose several frames and cause extra
interference.
27 26.01.2002 WCDMA Phys ical Layer
28. CPCH Operation
• After receiving CPCH AICH,
• UE sends a CPCH CD preamble with the same power from another
signature.
• If no collision after a certain time, the BS echo this signature back to the
UE on the CD Indication Channel (CD-ICH).
• Then, the UE sends data over several frames with fast power control.
• The CPCH status indicator channel (CSICH) carries the status of different
CPCH information.
BS
UE
CPCH Preamble AICH Preamble CPCH Message
CPCH CD CPCH CD-ICH
28 26.01.2002 WCDMA Phys ical Layer
29. Broadcast Channel (BCH)
• Downlink common transport channel.
• The physical channel of BCH is Primary Common Control Physical
Channel (Primary CCPCH).
• BCH:
• broadcast the system and cell-specific information, e.g., random
access codes or slots.
• terminals must decode the broadcast channel to register to the cell.
• uses high power in order to reach all users within a cell.
29 26.01.2002 WCDMA Phys ical Layer
30. Forward Access Channel (FACH)
• Downlink common transport channel.
• It can be multiplexed with PCH to the same physical channel,
Secondary CCPCH, or standalone.
• FACH:
• carry control information to UEs within a cell.
• carry small amount of packet data.
• no power control.
• can have several FACHs. But the primary one must have low data
rate in order to be received by all terminals.
• In-band signaling is needed to inform for which user the data was
intended.
30 26.01.2002 WCDMA Phys ical Layer
31. Paging Channel (PCH)
• Downlink common transport channel for transmission of paging and
notification messages, i.e., when the network wants to initiate
communication with the terminal.
• It can be multiplexed with FACH to the same physical channel,
Secondary CCPCH, or standalone.
• The identical paging message can be sent in a single cell or hundreds
of cells. The paging message has to be reached by all the terminals
within the whole cell.
• Its transmission is associated with transmission of paging indicator in
paging indicator channel (PICH).
31 26.01.2002 WCDMA Phys ical Layer
33. Common Pilot Channel (CPICH)
• Downlink channel with a fixed rate of 30 Kbps or SF of 256.
• Scrambled with the cell-specific primary scrambling code.
• Use for channel estimation reference at the terminal.
• Two types: primary and secondary CPICH
• Primary CPICH
• the measurements for the handover and cell selection / reselection.
• phase reference for SCH, primary CCPCH, AICH and etc.
• Secondary CPICH may be phase reference for the secondary
CCPCH.
33 26.01.2002 WCDMA Phys ical Layer
34. Synchronisation Channel (SCH) – Cell
Searching
• SCH is used for cell search.
• Two subchannels: primary and secondary SCH.
• P-SCH and S-SCH are only sent during the first 256 chips of each
slot in parallel and time-multiplexed with the Primary CCPCH.
256 chips
P-SCH 0 1 14
…
S-SCH 0 1 … 14
2560 chips
10 ms
34 26.01.2002 WCDMA Phys ical Layer
35. Synchronisation Channel (SCH) – Cell
Searching
• Cell search using SCH has three basic steps:
• The UE searches the 256-chip primary synchronisation code,
which is common to all cells and is the same in every slot. Detect
peaks in the output of the filter corresponds to the slot boundary
(slot synchronisation).
• The UE seeks the largest peak secondary synchronisation code
(SSC). There are 64 unique SSC sequences. Each SSC sequence
has 15 SSCs. The UE needs to know 15 successive SSCs from the
S-SCH, then it can determine the code group in order to know the
frame boundary (frame synchronisation).
• Each code group has 8 primary scrambling. The correct one is
found by each possible scrambling code in turn over the CPICH
of that cell.
35 26.01.2002 WCDMA Phys ical Layer
37. Primary Common Control Physical Channel
(Primary CCPCH)
• Carries broadcast channel (BCH).
• Needs to be demodulated by all terminals within the cell.
• Fixed rate of 30 kbps with a spreading factor of 256.
• Contains no power control information.
• Primary CCPCH is time-multiplexed with SCH; thus, it does not use
the first 256 chips. Channel bit rate is reduced to 27 kbps.
37 26.01.2002 WCDMA Phys ical Layer
38. Secondary Common Control Physical Channel
(Secondary CCPCH)
• Carries two transport channels: FACH and PCH, which can be
mapped to the same or separate channels.
• Variable bit rate.
• Fixed spreading factor is used. Data rate may vary with DTX or rate
matching parameters.
• Contains no power control information.
38 26.01.2002 WCDMA Phys ical Layer
40. Power Control Procedure
Frame reliabilty info.
DL
SIRtarget adjustment
UL
commands
BS
RNC
Fast Power Control
Outer Loop Power Control
if SIRestimate<SIRtarget,
if quality<target,
send "power up" command
increase SIRtarget
40 26.01.2002 WCDMA Phys ical Layer
41. Power Control (PC) – (1/2)
• Fast Closed Loop PC – Inner Loop PC
• Feedback information.
• Uplink PC is used for near-far problem. Downlink PC is to ensure
that there is enough power for mobiles at the cell edge.
• One PC command per slot – 1500 Hz
• Step 1 dB or 0.5 dB (1 PC command in every two slots).
• The SIR target for fast closed loop PC is set by the outer loop PC.
• Two special cases for fast closed loop PC:
• Soft handover: how to react to multiple power control commands
from several sources. At the mobile, a “power down” command
has higher priority over “power up” command.
• Compressed mode: Large step size is used after a compressed
frame to allow the power level to converge more quickly to the
correct value after the break.
41 26.01.2002 WCDMA Phys ical Layer
42. Power Control (PC) – (2/2)
• Closed Loop PC - Outer Loop PC
• Set the SIR target in order to maintain a certain frame error rate
(FER). Operated at radio network controller (RNC).
• Open loop PC
• No feedback information.
• Make a rough estimate of the path loss by means of a downlink
beacon signal.
• Provide a coarse initial power setting of the mobile at the
beginning of a connection.
• Apply only prior to initiating the transmission on RACH or
CPCH.
42 26.01.2002 WCDMA Phys ical Layer
43. Transmit Diversity (BS) – (1/2)
• Antenna diversity means that the same signal is transmitted or
received via more than one antenna.
• It can create multipath diversity against fading and shadowing.
• Transmit diversity at the BS - open-loop and closed-loop.
• Open Loop Mode
• No feedback information from the UE to the BS.
• BS decides the appropriate parameters for the TX diversity.
• Normally use for common channels because feedback
information from a particular UE may not be good for others
using the same common channel.
• Uses space-time-block-coding-based transmit diversity (STTD).
43 26.01.2002 WCDMA Phys ical Layer
44. Transmit Diversity (BS) – (2/2)
• Closed Loop Mode
• Feedback information from the UE to the BS to optimize the
transmission from the diversity antenna.
• Normally use for dedicated channels because they have the
feedback information bits (FBI).
• Based on FBI, the BS can adjust the phase and/or amplitude of
the antennas.
44 26.01.2002 WCDMA Phys ical Layer
45. Compressed Mode (1/2)
• The compressed mode is needed when making measurement from
another frequency.
• The transmission and reception are halted for a short time to perform
measurements on the other frequencies.
Measurement
gap
Normal Compressed Normal
Frame Mode Frame
45 26.01.2002 WCDMA Phys ical Layer
46. Compressed Mode (2/2)
• Three methods for compressed mode:
• Lowering the data rate from higher layers.
• Increasing the data rate by changing the spreading factor.
• Reducing the symbol rate by puncturing at the physical layer
multiplexing chain.
• More power is needed during compressed mode.
• No power control during compressed mode. Large step size is used
after a compressed frame to allow the power level to converge more
quickly to the correct value after the break.
46 26.01.2002 WCDMA Phys ical Layer
47. Handover
• Intra-mode handover
• Include soft handover, softer handover and hard handover.
• Rely on the Ec/No measurement performed from the CPICH.
• Inter-mode handover
• Handover to the UTRA TDD mode.
• Inter-system handover
• Handover to other system, such as GSM.
• Make measurement on the frequency during compressed mode.
47 26.01.2002 WCDMA Phys ical Layer