This presentation discusses about the WCDMA air Interface used in 3G i.e. UMTS. This Radio Interface has great capability on which Third Generation of Mobile Communication is built, with backward compatibility.
This presentation discusses about the WCDMA air Interface used in 3G i.e. UMTS. This Radio Interface has great capability on which Third Generation of Mobile Communication is built, with backward compatibility.
This presentation covers:
What is a Radio Resource Unit ?
Why do we need RRM ?
Need of RRM in WCDMA ?
RRM algorithms Objectives
Different RRM functions : Handover, Power control, Admission Control, Code Management
FREQUENCY CONCEPTS
The following table summarizes the frequency-related specifications of each of the GSM systems. The terms used in the table are explained in the remainder of this section.
System P-GSM 900 E-GSM 900 GSM 1800
Frequencies: • Uplink • Downlink
890-915 MHz
935-960 MHz
Wavelength ~ 33 cm
880-915 MHz
925-960 MHz
GSM 1900
1710-1785 MHz
1805-1880 MHz
1850-1910 MHz
1930-1990 MHz
~ 33 cm ~ 17 cm ~ 16 cm
Bandwidth 25 MHz
35 MHz 75 MHz 60 MHz
Duplex Distance 45 MHz
45 MHz 95 MHz 80 MHz
Carrier Separation 200 kHz
1
Radio Channels
200 kHz 200 kHz 200 kHz
125
175 375 300
Transmission Rate 270 kbits/s
270 kbits/s 270 kbits/s 270 kbits/s
Table 3-1 Frequency-related specifications
FREQUENCY
F Did you know?
Due to frequency, a BTS transmitting information at 1800 MHz with an output power of 10 Watts (W) will cover only half the area of a similar BTS transmitting at 900 MHz. To counteract this, BTSs using 1800 MHz may use a higher output power.
An MS communicates with a BTS by transmitting or receiving radio waves, which consist of electromagnetic energy. The frequency of a radio wave is the number of times that the wave oscillates per second. Frequency is measured in Hertz (Hz), where 1 Hz indicates one oscillation per second. Radio frequencies are used for many applications in the world today. Some common uses include:
• Television: 300 MHz approx. • FM Radio: 100 MHz approx. • Police radios: Country dependent • Mobile networks: 300 - 2000 MHz approx.
The frequencies used by mobile networks varies according to the standard being used
2
. An operator applies for the available frequencies or, as in the United States, the operator bids for frequency bands at an auction. The following diagram displays the frequencies used by the major mobile standards:
DAMPS 1900 MHz
0450900800 1500 1800 1900 NMT 450
PDC 800
GSM 900 GSM 1800 GSM 1900NMT 900
PDC 1500AMPS DAMPS 800
TACS
Figure 3-1 Frequencies for major mobile standards
This presentation covers:
What is a Radio Resource Unit ?
Why do we need RRM ?
Need of RRM in WCDMA ?
RRM algorithms Objectives
Different RRM functions : Handover, Power control, Admission Control, Code Management
FREQUENCY CONCEPTS
The following table summarizes the frequency-related specifications of each of the GSM systems. The terms used in the table are explained in the remainder of this section.
System P-GSM 900 E-GSM 900 GSM 1800
Frequencies: • Uplink • Downlink
890-915 MHz
935-960 MHz
Wavelength ~ 33 cm
880-915 MHz
925-960 MHz
GSM 1900
1710-1785 MHz
1805-1880 MHz
1850-1910 MHz
1930-1990 MHz
~ 33 cm ~ 17 cm ~ 16 cm
Bandwidth 25 MHz
35 MHz 75 MHz 60 MHz
Duplex Distance 45 MHz
45 MHz 95 MHz 80 MHz
Carrier Separation 200 kHz
1
Radio Channels
200 kHz 200 kHz 200 kHz
125
175 375 300
Transmission Rate 270 kbits/s
270 kbits/s 270 kbits/s 270 kbits/s
Table 3-1 Frequency-related specifications
FREQUENCY
F Did you know?
Due to frequency, a BTS transmitting information at 1800 MHz with an output power of 10 Watts (W) will cover only half the area of a similar BTS transmitting at 900 MHz. To counteract this, BTSs using 1800 MHz may use a higher output power.
An MS communicates with a BTS by transmitting or receiving radio waves, which consist of electromagnetic energy. The frequency of a radio wave is the number of times that the wave oscillates per second. Frequency is measured in Hertz (Hz), where 1 Hz indicates one oscillation per second. Radio frequencies are used for many applications in the world today. Some common uses include:
• Television: 300 MHz approx. • FM Radio: 100 MHz approx. • Police radios: Country dependent • Mobile networks: 300 - 2000 MHz approx.
The frequencies used by mobile networks varies according to the standard being used
2
. An operator applies for the available frequencies or, as in the United States, the operator bids for frequency bands at an auction. The following diagram displays the frequencies used by the major mobile standards:
DAMPS 1900 MHz
0450900800 1500 1800 1900 NMT 450
PDC 800
GSM 900 GSM 1800 GSM 1900NMT 900
PDC 1500AMPS DAMPS 800
TACS
Figure 3-1 Frequencies for major mobile standards
It discusses about the 3G call flow scenarios for both the Circuit Switched (CS) and Packet Switched (PS). Calls are mobile originated. Call making and call tear down both are discussed.
This presentation will give you a glance at NOKIA RNC solutions, RNC configuration,RNC cabinet mechanical structure,RNC architecture, RNC plug-in units (PIU)
,RNC function units (FUs), redundancy and PIUs configuration
Ericsson’s proprietary Lean Carrier innovation is first to address intercell signaling interference, introducing lean design concepts to 4G LTE to improve data speed and app coverage for users while on the road to 5G.
With the Ericsson 5G Core System we have built an architecture that is highly flexible, modular, and scalable. It supports a much higher degree of programmability and is ready to exist in a cloud-based environment. We help you to quickly react to new challenges and capture any business opportunity that arise.
Implementation of Pipelined Architecture for Physical Downlink Channels of 3G...josephjonse
LTE (Long Term Evolution) is a high data rate, low latency and packet optimized radio access technology designed to support roaming Internet access via cell phones and handheld devices in 3G and 4G networks. This paper mainly focuses on to improve the processing speed and decrease the maximum delay of the downlink channels using the pipelined buffer controlled technique. This paper proposes Pipelined buffer controlled Architecture for both transmitter and receiver for Physical Downlink channels of 3GPP-LTE. The transmitter architecture comprises Bit Scrambling, Modulation mapping, Layer mapping, Precoding and Resource element mapping modules. The receiver architecture comprises Demapping from resource elements, Decoding, Comparing and Detection, Delayer mapping and Descrambling modules as described in LTE specifications. In addition to these, buffers are included in both transmitter and receiver architectures. Modelsim is used for simulation, synthesis and implementation are achieved using PlanAhead13.2 tool on Virtex-5, xc5vlx50tff1136-1 device board is used. Implemented results are discussed in terms of RTL design, FPGA editor, Power estimation and Resource estimation.
4G-Fourth Generation Mobile Communication SystemSafaet Hossain
Seminar on "4G-Fourth Generation Mobile Communication System" at UODA Auditorium, November 16,2013.
Technical Presented by: Ahmedul Quadir, Function Tester, Ericcson, Sweeden
REALIZATION OF TRANSMITTER AND RECEIVER ARCHITECTURE FOR DOWNLINK CHANNELS IN...VLSICS Design
Long Term Evolution (LTE), the next generation of radio technologies designed to increase the capacity and speed of mobile networks. The future communication systems require much higher peak rate for the air interface but very short processing delay. This paper mainly focuses on to improve the processing speed and capability and decrease the processing delay of the downlink channels using the parallel processing technique. This paper proposes Parallel Processing Architecture for both transmitter and receiver for Downlink channels in 3GPP-LTE. The Processing steps include Scrambling, Modulation, Layer mapping, Precoding and Mapping to the REs in transmitter side. Similarly demapping from the REs, Decoding and Detection, Delayer mapping and Descrambling in Receiver side. Simulation is performed by using modelsim and Implementation is achieved using Plan Ahead tool and virtex 5 FPGA.Implemented results are discussed in terms of RTL design, FPGA editor, power estimation and resource estimation.
Here you are an interesting explanation about HSPA Technology. The High Speed packet Access is the combination of two technologies, one of the downlink and the other for the uplink that can be built onto the existing 3G UMTS or W-CDMA technology to provide increased data transfer speeds.
The original 3G UMTS / W-CDMA standard provided a maximum download speed of 384 kbps.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
List channel in wcdma
1. WCDMA Physical Layer (Chapter 6)
Peter Chong, Ph.D. (UBC, Canada)
Research Engineer
Nokia Research Center, Helsinki, Finland
1
26.01.2002
WCDMA Phys ical Layer
2. Introduction
• This lecture presents a general WCDMA or UTRA (Universal
Terrestrial Radio Access) FDD (Frequency Division Duplex)
physical layer issues.
• Spreading and Scrambling
• Transport Channels
• Physical Channels
• Signaling
• Physical Layer Procedures
2
26.01.2002
Mapping
to
WCDMA Phys ical Layer
3. Some Parameters of WCDMA Physical Layer
Carrier Spacing
Chip Rate
10 ms (38400 chips)
No. of slots/frame
15
No. of chips/slot
2560 chips (Max. 2560 bits)
Uplink SF
4 to 256
Downlink SF
4 to 512
Channel Rate
26.01.2002
3.84 Mcps
Frame Length
3
5 MHz (nominal)
7.5 Kbps to 960 Kbps
WCDMA Phys ical Layer
5. Spreading Operation
• Spreading means increasing the signal bandwidth
• Strickly speaking, spreading includes two operations:
• Channelisation (increases signal bandwidth) - using orthogonal
codes
• Scrambling (does not affect the signal bandwidth) - using pseudonoise codes
channelization codes (SF) scrambling codes
Data
bit rate
5
26.01.2002
chip rate
chip rate
WCDMA Phys ical Layer
6. Channelisation (1/3)
• Channelisation codes are orthogonal codes, based on Orthogonal
Variable Spreading Factor (OVSF) technique
• The codes are fully orthogonal, i.e., they do not interfere with each
other, only if the codes are time synchronized
• Thus, channelisation codes can separate the transmissions from a
single source
• In the downlink, it can separate different users within one cell/sector
• Limited orthogonal codes must be reused in every cell
• Problem: Interference if two cells use the same code
• Solution: Scrambling codes to reduce inter-base-station interference
6
26.01.2002
WCDMA Phys ical Layer
7. Channelisation (2/3)
• In the uplink, it can only separate the physical channels/services of one
user because the mobiles are not synchronised in time.
• It is possible that two mobiles are using the same codes.
• In order to separate different users in the uplink, scrambling codes are
used.
• The channelisation codes are picked from the code tree as shown in
next slide.
• One code tree is used with one scrambling code on top of the tree.
• If c4,4 is used, no codes from its subtree can be used (c8,7 , c8,8 , …).
7
26.01.2002
WCDMA Phys ical Layer
9. Scrambling
• In the scrambling process the code sequence is multiplied with a
pseudorandom scrambling code.
• The scrambling code can be a long code (a Gold code with 10 ms
period) or a short code (S(2) code).
• In the downlink scrambling codes are used to reduce the inter-basestation interference. Typically, each Node B has only one scrambling
code for UEs to separate base stations. Since a code tree under one
scrambling code is used by all users in its cell, proper code
management is needed.
• In the uplink scrambling codes are used to separate the terminals.
9
26.01.2002
WCDMA Phys ical Layer
10. Summary
Channelisation code
Usage
Scrambling code
UL: Separation of physcial data
and control channels from same UE
DL: Seperation of different users
within one cell
UL: Separation of terminals
DL: Separation of
cells/sectors
Length
No. of
codes
No. of codes under one scrambling
code = SF
UL: Several millions
DL: 512
Code
family
Orthogonal Variable Spreading
Factor
Spreading
10
UL:4 – 256 chips same as SF
DL:4 – 512 chips same as SF
Limited codes in each
cell for DL.
UL: 10ms=38400 chips
38400
DL: 10ms=38499 chips
Yes, increase transmission
bandwidth
Long 10ms code: Gold code
Short code: Extended S(2)
code family
No, does not affect
transmission bandwidth
26.01.2002
WCDMA Phys ical Layer
12. Channel Concepts
• Three separate channels concepts in the UTRA: logical, transport, and
physical channels.
• Logical channels define what type of data is transferred.
• Transport channels define how and with which type of characteristics the
data is transferred by the physical layer.
• Physical data define the exact physical characteristics of the radio channel.
RLC layer
L2
Logical Channel
MAC layer
Transport Channel
PHY layer
L1
Physical Channel
12
26.01.2002
WCDMA Phys ical Layer
13. Transport Channels -> Physical Channels
(1/3)
• Transport channels contain the data generated at the higher layers,
which is carried over the air and are mapped in the physical layer to
different physical channels.
• The data is sent by transport block from MAC layer to physical layer
and generated by MAC layer every 10 ms.
• The transport format of each transport channel is identified by the
Transport Format Indicator (TFI), which is used in the interlayer
communication between the MAC layer and physical layer.
• Several transport channels can be multiplexed together by physical
layer to form a single Coded Composite Transport Channel
(CCTrCh).
13
26.01.2002
WCDMA Phys ical Layer
14. Transport Channels -> Physical Channels
(2/3)
• The physical layer combines several TFI information into the
Transport Format Combination Indicator (TFCI), which indicate
which transport channels are active for the current frame.
• Two types of transport channels: dedicated channels and common
channels.
• Dedicated channel –reserved for a single user only.
• Support fast power control and soft handover.
• Common channel – can be used by any user at any time.
• Don’t support soft handover but some support fast power control.
• In addition to the physical channels mapped from the transport
channels, there exist physical channels for signaling purposes to
carry only information between network and the terminals.
14
26.01.2002
WCDMA Phys ical Layer
15. Transport Channels -> Physical Channels (3/3)
Transport Channel
Physical Channel
(UL/DL) Dedicated channel DCH
Dedicated physical data channel DPDCH
(UL) Random access channel RACH
Dedicated physical control channel DPCCH
Physical random access channel PRACH
(UL) Common packet channel CPCH
Physical common packet channel PCPCH
(DL) Broadcast channel BCH
Primary common control physical channel P-CCPCH
(DL) Forward access channel FACH
Secondary common control physical channel S-CCPCH
(DL) Paging channel PCH
(DL) Downlink shared channel DSCH
Physical downlink shared channel PDSCH
Synchronisation channel SCH
Common pilot channel CPICH
Signaling physical channels
Acquisition indication channel AICH
Paging indication channel PICH
CPCH Status indication channel CSICH
Collision detection/Channel assignment indicator channel
CD/CA-ICH
15
26.01.2002
WCDMA Phys ical Layer
16. UL Dedicated Channel DCH (1/3)
• Due to audible interference to the audio equipment caused from the
discontinuous UL transmission, two dedicated physical channels are
I-Q/code multiplexing (called dual-channel QPSK modulation)
instead of time multiplexing.
Data (DPDCH)
DTX Period
Data (DPDCH)
Layer 1 Control Information (DPCCH)
complex
channelization code, cD
scrambling code
Data
(DPDCH)
Control
(DPDCH)
I+jQ
*j
BPSK for each channel
channelization code, cC
16
26.01.2002
WCDMA Phys ical Layer
17. UL Dedicated Channel DCH (2/3)
• Dedicated Physical Control Channel (DPCCH) has a fixed spreading factor
of 256 and carries physical layer control information.
• DPCCH has four fields: Pilot, TFCI, FBI, TPC.
Pilot – channel estimation + SIR estimate for PC
TFCI – bit rate, channel decoding, interleaving parameters for every
DPDCH frame
FBI (Feedback Information) – transmission diversity in the DL
TPC (Transmission Power Control) – power control command
2560 chips
DPDCH
Data
DPCCH
Uplink DPCH
PILOT
0
1
TFCI
2
FBI
TPC
14
10 ms
17
26.01.2002
WCDMA Phys ical Layer
18. UL Dedicated Channel DCH (3/3)
•Dedicated Physical Data Channel (DPDCH) has a spreading factor
from 4 to 256 and its data rate may vary on a frame-by-frame basis.
•Parallel channel codes can be used in order to provide 2 Mbps user
data
DPDCH SF
256
15 kbps
64
60
30 kbps
120
60 kbps
16
240
120 kbps
8
480
240 kbps
4
960
480 kbps
4, with 6 parallel codes
26.01.2002
30
32
18
Max. user data rate with ½
rate coding (approx.)
7.5 kbps
128
3.84 Mcps/256=15 kbps
DPDCH channel
bit rate (kbps)
15
5740
2.3 Mbps
WCDMA Phys ical Layer
20. DL Dedicated Channel DCH (1/3)
• In the DL no audible interference is generated with DTX because the
common channels are continuously transmitting.
• Downlink DCH is transmitted on the Downlink Dedicated Physical
Channel (Downlink DPCH); thus, DPCCH and DPDCH are timemultiplexed and using normal QPSK modulation.
No FBI
DPCCH
TPC
Slot
Downlink
DPCH
0
DPDCH
2560 chips
DPCCH
DATA
TFCI
1
2
DPDCH
DPCCH
DATA
PILOT
14
10 ms
20
26.01.2002
WCDMA Phys ical Layer
21. DL Dedicated Channel DCH (2/3)
• A code tree under one scrambling code is shared by several users. Normally,
one scrambling code and thus only one code tree is used per sector in the BS.
• DCH SF does not vary on a frame-by-frame basis; thus, data rate is varied by
rate matching operation, puncturing or repeating bits, or with DTX, where the
transmission is off during part of the slot.
• The SF is the same for all the codes with multicode transmission.
Downlink DPCH slot
A full rate
A half rate
21
TFCI
TFCI TrCh A DTX
26.01.2002
TrCh A
TPC
TrCh B
PILOT
TPC
TrCh B
PILOT
WCDMA Phys ical Layer
22. DL Dedicated Channel DCH (3/3)
• UL DPDCH consists of BPSK symbols whereas DL DPDCH consists of QPSK
symbols. The bit rate in the DL DPDCH can be almost double that in the UL
DPDCH.
Spreading factor
Channel
bit rate
(kbps)
DPDCH channel
bit rate range
(kbps)
Max. user data rate
with ½ rate coding
(approx.)
512
7.5
15
3-6
1-3 kbps
256
15
30
12-24
6-12 kbps
128
30
60
42-51
20-24 kbps
64
60
120
90
45 kbps
32
120
240
210
105 kbps
16
240
480
432
215 kbps
8
480
960
912
456 kbps
4
960
1920
1872
936 kbps
4, with 3 parallel
codes
22
Channel
symbol rate
(kbps)
2880
5760
5616
2.3 Mbps
26.01.2002
WCDMA Phys ical Layer
24. Downlink Shared Channel (DSCH)
• Used for dedicated control or traffic data (bursty traffic).
• Shared by several users. Each user may allocate a DSCH for a short
period of time based on a particular packet scheduling algorithm.
• Support the use of fast power control, but not soft-handover.
• Use a variable spreading factor on a frame-by-frame basis so that bit
rate can be varied on a frame-by-frame basis.
• Associated with a DL DPCH with the use of DPCCH. Such a DL
DPCCH from TFCI provides the power control information, an
indication to which terminal to decode the DSCH and spreading
code of the DSCH.
• Since the information of DSCH is provided from an associated DL
DPCH, the PDSCH frame may not be started before 3 slots after the
end of that associated DL DPCH.
24
26.01.2002
WCDMA Phys ical Layer
25. Random Access Channel (RACH)
• A contention-based uplink transport channel; thus, no scheduling is
performed.
• Use of RACH
• Carry control information from the UE to set up an initial
connection. For example, to register the UE after power-on to the
network or to perform location update or to initiate a call.
• Send small amount of packet data to network for 1 to 2 frames.
• Since it is needed to be heard from the whole cell for signaling
purposes, the data rate is quite low.
• No power control is supported.
25
26.01.2002
WCDMA Phys ical Layer
26. RACH Operation
• First, UE sends a preamble.
• The SF of the preamble is 256 and contain a signature sequence of 16
symbols – a total length of 4096 chips.
• Wait for the acknowledged with the Acquisition (AICH) from the BS.
• In case no AICH received after a period of time, the UE sends another
preamble with higher power.
• When AICH is received, UE sends 10 or 20 ms message part.
• The SF for the message is from 32 to 256.
BS
UE
RACH Preamble
26
26.01.2002
AICH Preamble
RACH Message
WCDMA Phys ical Layer
27. Common Packet Channel (CPCH)
• A contention-based uplink transport channel for transmission of
bursty data traffic.
• Different from RACH, channel can be reserved for several frames
and it uses fast power control.
• Information of CPCH is provided by
• DL DPCCH for fast power control information.
• Forward Access Channel (FACH) for higher layer DL signaling.
• CPCH operation is similar to RACH operation except that it has
Layer 1 Collision Detection (CD).
• In RACH, one RACH message is lost, whereas in CPCH an
undetected collision may lose several frames and cause extra
interference.
27
26.01.2002
WCDMA Phys ical Layer
28. CPCH Operation
• After receiving CPCH AICH,
• UE sends a CPCH CD preamble with the same power from another
signature.
• If no collision after a certain time, the BS echo this signature back to the
UE on the CD Indication Channel (CD-ICH).
• Then, the UE sends data over several frames with fast power control.
• The CPCH status indicator channel (CSICH) carries the status of different
CPCH information.
BS
UE
CPCH Preamble
CPCH CD
28
26.01.2002
AICH Preamble
CPCH Message
CPCH CD-ICH
WCDMA Phys ical Layer
29. Broadcast Channel (BCH)
• Downlink common transport channel.
• The physical channel of BCH is Primary Common Control Physical
Channel (Primary CCPCH).
• BCH:
• broadcast the system and cell-specific information, e.g., random
access codes or slots.
• terminals must decode the broadcast channel to register to the cell.
• uses high power in order to reach all users within a cell.
29
26.01.2002
WCDMA Phys ical Layer
30. Forward Access Channel (FACH)
• Downlink common transport channel.
• It can be multiplexed with PCH to the same physical channel,
Secondary CCPCH, or standalone.
• FACH:
• carry control information to UEs within a cell.
• carry small amount of packet data.
• no power control.
• can have several FACHs. But the primary one must have low data
rate in order to be received by all terminals.
• In-band signaling is needed to inform for which user the data was
intended.
30
26.01.2002
WCDMA Phys ical Layer
31. Paging Channel (PCH)
• Downlink common transport channel for transmission of paging and
notification messages, i.e., when the network wants to initiate
communication with the terminal.
• It can be multiplexed with FACH to the same physical channel,
Secondary CCPCH, or standalone.
• The identical paging message can be sent in a single cell or hundreds
of cells. The paging message has to be reached by all the terminals
within the whole cell.
• Its transmission is associated with transmission of paging indicator in
paging indicator channel (PICH).
31
26.01.2002
WCDMA Phys ical Layer
33. Common Pilot Channel (CPICH)
• Downlink channel with a fixed rate of 30 Kbps or SF of 256.
• Scrambled with the cell-specific primary scrambling code.
• Use for channel estimation reference at the terminal.
• Two types: primary and secondary CPICH
• Primary CPICH
• the measurements for the handover and cell selection / reselection.
• phase reference for SCH, primary CCPCH, AICH and etc.
• Secondary CPICH may be phase reference for the secondary
CCPCH.
33
26.01.2002
WCDMA Phys ical Layer
34. Synchronisation Channel (SCH) – Cell
Searching
• SCH is used for cell search.
• Two subchannels: primary and secondary SCH.
• P-SCH and S-SCH are only sent during the first 256 chips of each
slot in parallel and time-multiplexed with the Primary CCPCH.
256 chips
P-SCH
0
1
…
14
S-SCH
0
1
…
14
2560 chips
10 ms
34
26.01.2002
WCDMA Phys ical Layer
35. Synchronisation Channel (SCH) – Cell
Searching
• Cell search using SCH has three basic steps:
•
The UE searches the 256-chip primary synchronisation code,
which is common to all cells and is the same in every slot. Detect
peaks in the output of the filter corresponds to the slot boundary
(slot synchronisation).
•
The UE seeks the largest peak secondary synchronisation code
(SSC). There are 64 unique SSC sequences. Each SSC sequence
has 15 SSCs. The UE needs to know 15 successive SSCs from the
S-SCH, then it can determine the code group in order to know the
frame boundary (frame synchronisation).
• Each code group has 8 primary scrambling. The correct one is
found by each possible scrambling code in turn over the CPICH
of that cell.
35
26.01.2002
WCDMA Phys ical Layer
37. Primary Common Control Physical Channel
(Primary CCPCH)
• Carries broadcast channel (BCH).
• Needs to be demodulated by all terminals within the cell.
• Fixed rate of 30 kbps with a spreading factor of 256.
• Contains no power control information.
• Primary CCPCH is time-multiplexed with SCH; thus, it does not use
the first 256 chips. Channel bit rate is reduced to 27 kbps.
37
26.01.2002
WCDMA Phys ical Layer
38. Secondary Common Control Physical Channel
(Secondary CCPCH)
• Carries two transport channels: FACH and PCH, which can be
mapped to the same or separate channels.
• Variable bit rate.
• Fixed spreading factor is used. Data rate may vary with DTX or rate
matching parameters.
• Contains no power control information.
38
26.01.2002
WCDMA Phys ical Layer
40. Power Control Procedure
Frame reliabilty info.
DL
SIRtarget adjustment
UL
commands
RNC
Outer Loop Power Control
if quality<target,
increase SIRtarget
40
26.01.2002
BS
Fast Power Control
if SIRestimate<SIRtarget,
send "power up" command
WCDMA Phys ical Layer
41. Power Control (PC) – (1/2)
• Fast Closed Loop PC – Inner Loop PC
• Feedback information.
• Uplink PC is used for near-far problem. Downlink PC is to ensure
that there is enough power for mobiles at the cell edge.
• One PC command per slot – 1500 Hz
• Step 1 dB or 0.5 dB (1 PC command in every two slots).
• The SIR target for fast closed loop PC is set by the outer loop PC.
• Two special cases for fast closed loop PC:
•
•
41
26.01.2002
Soft handover: how to react to multiple power control commands
from several sources. At the mobile, a “power down” command
has higher priority over “power up” command.
Compressed mode: Large step size is used after a compressed
frame to allow the power level to converge more quickly to the
correct value after the break.
WCDMA Phys ical Layer
42. Power Control (PC) – (2/2)
• Closed Loop PC - Outer Loop PC
• Set the SIR target in order to maintain a certain frame error rate
(FER). Operated at radio network controller (RNC).
• Open loop PC
• No feedback information.
• Make a rough estimate of the path loss by means of a downlink
beacon signal.
• Provide a coarse initial power setting of the mobile at the
beginning of a connection.
• Apply only prior to initiating the transmission on RACH or
CPCH.
42
26.01.2002
WCDMA Phys ical Layer
43. Transmit Diversity (BS) – (1/2)
• Antenna diversity means that the same signal is transmitted or
received via more than one antenna.
• It can create multipath diversity against fading and shadowing.
• Transmit diversity at the BS - open-loop and closed-loop.
• Open Loop Mode
• No feedback information from the UE to the BS.
• BS decides the appropriate parameters for the TX diversity.
• Normally use for common channels because feedback
information from a particular UE may not be good for others
using the same common channel.
• Uses space-time-block-coding-based transmit diversity (STTD).
43
26.01.2002
WCDMA Phys ical Layer
44. Transmit Diversity (BS) – (2/2)
• Closed Loop Mode
• Feedback information from the UE to the BS to optimize the
transmission from the diversity antenna.
• Normally use for dedicated channels because they have the
feedback information bits (FBI).
• Based on FBI, the BS can adjust the phase and/or amplitude of
the antennas.
44
26.01.2002
WCDMA Phys ical Layer
45. Compressed Mode (1/2)
• The compressed mode is needed when making measurement from
another frequency.
• The transmission and reception are halted for a short time to perform
measurements on the other frequencies.
Measurement
gap
Normal
Frame
45
26.01.2002
Compressed
Mode
Normal
Frame
WCDMA Phys ical Layer
46. Compressed Mode (2/2)
• Three methods for compressed mode:
• Lowering the data rate from higher layers.
• Increasing the data rate by changing the spreading factor.
• Reducing the symbol rate by puncturing at the physical layer
multiplexing chain.
• More power is needed during compressed mode.
• No power control during compressed mode. Large step size is used
after a compressed frame to allow the power level to converge more
quickly to the correct value after the break.
46
26.01.2002
WCDMA Phys ical Layer
47. Handover
• Intra-mode handover
• Include soft handover, softer handover and hard handover.
• Rely on the Ec/No measurement performed from the CPICH.
• Inter-mode handover
• Handover to the UTRA TDD mode.
• Inter-system handover
• Handover to other system, such as GSM.
• Make measurement on the frequency during compressed mode.
47
26.01.2002
WCDMA Phys ical Layer