The document discusses key aspects of synchronization signal blocks (SSBs) in 5G NR, including:
1) An SSB consists of PSS, SSS and PBCH which enable cell search and detection of physical layer cell ID.
2) SSBs are transmitted periodically with configurable periodicities and occupy 4 OFDM symbols in the time domain.
3) In the frequency domain, SSBs are transmitted on synchronization rasters called GSCNs which have wider steps than LTE to facilitate faster cell search.
The document discusses PCI (Physical Cell Identity) planning in LTE networks. It describes the cell search process where the UE detects the PCI from the PSS and SSS. The PCI is used to determine the location of reference signals and avoid interference. The document recommends strategies for PCI planning such as assigning color groups to sectors and code groups to sites to avoid conflicting PCI combinations in adjacent cells. It also discusses tools to analyze potential PCI interference and make changes to mitigate issues.
The document discusses Inter-Radio Access Technology (IRAT) handover and cell change, which allows the transition of 3G voice and data services between WCDMA and GSM networks to maintain connections and prevent dropped calls. It describes the IRAT handover evaluation process based on UE measurement reports and covers topics like coverage monitoring, event reporting, parameters, handover sequences, cell change procedures, and directed retry to offload traffic between networks.
The document provides an overview of GSM RF interview questions and answers. It covers topics such as the three services offered by GSM (teleservices, bearer services, and supplementary services), spectrum allocation for GSM-900 and DCS-1800, carrier frequencies and separation, ciphering and authentication algorithms, equalization, interleaving, speech coding, channel coding, frequency reuse, cell splitting, interfaces (Um, Abis, A), LAPD and LAPDm, WPS, MA, MAIO, frequency hopping types, DTX, DRX, gross data rate, Erlangs and grade of service, coverage differences between GSM900 and DCS1800, time advance, location area and location update
The document summarizes key LTE parameters including RSRP, RSRQ, SINR, RSSI, CQI, PCI, BLER, throughput, latency, tracking area code, timing advance, and transmit power. RSRP measures reference signal power and is used for coverage and path loss calculations. RSRQ measures signal quality near cell edges. SINR measures signal quality accounting for interference and noise. CQI indicates downlink channel quality. PCI identifies cells. BLER indicates block error rate. Latency aims to be less than 10ms for user data and 100ms for control signaling. Timing advance synchronizes uplink transmissions accounting for UE distance from the base station.
The document discusses the primary and secondary synchronization signals used in LTE networks. It notes that the primary synchronization signal (PSS) and secondary synchronization signal (SSS) are transmitted once every 5 ms on subcarriers in the middle of the frequency band. The PSS is used for detection of carrier frequency and timing, while the SSS identifies the physical cell ID and other parameters. It recommends strategies for assigning physical cell IDs to avoid non-optimal combinations in adjacent cells that could cause long synchronization times and interference.
The document discusses LTE uplink power control. It describes that uplink power control uses both open-loop and closed-loop mechanisms. Open-loop power control estimates path loss to set the initial transmission power, while closed-loop allows the network to directly control transmission power through power control commands. Power control helps reduce interference, maximize data rates, and prolong UE battery life by adjusting transmission power on a subframe basis.
This document provides an overview of the LTE1841 Inter Frequency Load Equalization feature. It describes the motivation and goals of the feature, which are to equalize load between inter-frequency cells by maintaining the load difference between partner cells according to a configured delta. The technical details section explains the key aspects of how load is measured and exchanged between cells, how the active mode load equalization state is determined, and the process for candidate UE selection and load equalization execution.
The document discusses PCI (Physical Cell Identity) planning in LTE networks. It describes the cell search process where the UE detects the PCI from the PSS and SSS. The PCI is used to determine the location of reference signals and avoid interference. The document recommends strategies for PCI planning such as assigning color groups to sectors and code groups to sites to avoid conflicting PCI combinations in adjacent cells. It also discusses tools to analyze potential PCI interference and make changes to mitigate issues.
The document discusses Inter-Radio Access Technology (IRAT) handover and cell change, which allows the transition of 3G voice and data services between WCDMA and GSM networks to maintain connections and prevent dropped calls. It describes the IRAT handover evaluation process based on UE measurement reports and covers topics like coverage monitoring, event reporting, parameters, handover sequences, cell change procedures, and directed retry to offload traffic between networks.
The document provides an overview of GSM RF interview questions and answers. It covers topics such as the three services offered by GSM (teleservices, bearer services, and supplementary services), spectrum allocation for GSM-900 and DCS-1800, carrier frequencies and separation, ciphering and authentication algorithms, equalization, interleaving, speech coding, channel coding, frequency reuse, cell splitting, interfaces (Um, Abis, A), LAPD and LAPDm, WPS, MA, MAIO, frequency hopping types, DTX, DRX, gross data rate, Erlangs and grade of service, coverage differences between GSM900 and DCS1800, time advance, location area and location update
The document summarizes key LTE parameters including RSRP, RSRQ, SINR, RSSI, CQI, PCI, BLER, throughput, latency, tracking area code, timing advance, and transmit power. RSRP measures reference signal power and is used for coverage and path loss calculations. RSRQ measures signal quality near cell edges. SINR measures signal quality accounting for interference and noise. CQI indicates downlink channel quality. PCI identifies cells. BLER indicates block error rate. Latency aims to be less than 10ms for user data and 100ms for control signaling. Timing advance synchronizes uplink transmissions accounting for UE distance from the base station.
The document discusses the primary and secondary synchronization signals used in LTE networks. It notes that the primary synchronization signal (PSS) and secondary synchronization signal (SSS) are transmitted once every 5 ms on subcarriers in the middle of the frequency band. The PSS is used for detection of carrier frequency and timing, while the SSS identifies the physical cell ID and other parameters. It recommends strategies for assigning physical cell IDs to avoid non-optimal combinations in adjacent cells that could cause long synchronization times and interference.
The document discusses LTE uplink power control. It describes that uplink power control uses both open-loop and closed-loop mechanisms. Open-loop power control estimates path loss to set the initial transmission power, while closed-loop allows the network to directly control transmission power through power control commands. Power control helps reduce interference, maximize data rates, and prolong UE battery life by adjusting transmission power on a subframe basis.
This document provides an overview of the LTE1841 Inter Frequency Load Equalization feature. It describes the motivation and goals of the feature, which are to equalize load between inter-frequency cells by maintaining the load difference between partner cells according to a configured delta. The technical details section explains the key aspects of how load is measured and exchanged between cells, how the active mode load equalization state is determined, and the process for candidate UE selection and load equalization execution.
1. The PBCH is a downlink physical channel that broadcasts essential initial access parameters like system bandwidth. It occupies 72 subcarriers in the first 4 OFDM symbols of the second slot of every 10ms radio frame. The PBCH carries a 14-bit MIB that is coded at a low rate and mapped to center subcarriers.
2. The PCFICH indicates the number of OFDM symbols used for the PDCCH. It occupies 16 resource elements in the first symbol of each 1ms subframe. The PCFICH carries the CFI value which is coded to use the full 32 bits.
3. The PDCCH carries downlink control information like resource allocations using QPSK.
The document provides information on the fundamentals and evolution of 3G mobile communication standards. It discusses:
- 1st generation standards including AMPS, TACS, NMT, and others operating between 30-200 KHz.
- 2nd generation standards including GSM, IS-136, IS-95, and PDC operating at 200 KHz, utilizing TDMA and early digital technologies.
- UMTS (3G) evolution through 3GPP releases, utilizing WCDMA technology, and achieving speeds up to 2 Mbps through improvements like HSPA and LTE.
The document discusses various LTE measurement parameters and procedures including:
1. The eNB reports a list of detected PRACH preambles and measures timing advance, average RSSI, average SINR, UL CSI, and transport BLER for RRM purposes.
2. UE measurements include CQI, RSRP, and RSRQ while eNB measurements include timing advance, RSSI, SINR, UL CSI, detected preambles, and transport BLER. Inter-RAT measurements are also discussed.
3. Examples of RSRP, RSRQ, and timing advance procedures are provided along with CQI measurement details. PLMN selection, cell selection,
The document provides an overview and analysis flow for optimizing the performance of a mobile network. It discusses various problems that can occur like low availability of control channels, congestion on signaling and traffic channels, and high drop call rates. For each problem, it lists probable causes and recommends actions to identify the issue and solutions to resolve it, such as adjusting configuration parameters, adding network capacity, or improving frequency planning. MML commands are also provided to check device logs, resources, and performance statistics for troubleshooting purposes.
The document describes the Master Information Block (MIB) and System Information Blocks (SIBs) in 5G NR networks. It provides details on the contents and purpose of the MIB, SIB1, SIB2, SIB3, SIB4 and SystemInformation message. These messages contain essential system information for cell selection and access procedures in 5G networks.
Ericsson important optimization parametersPagla Knight
The document lists important optimization parameters for Ericsson including parameters related to system configuration, capacity management, directed retry, handover, HSDPA/EUL, IRAT, and idle mode selection and reselection. It provides descriptions of over 50 parameters that control aspects such as power levels, admission limits, thresholds for cell reselection, and criteria for measurements.
The document discusses key planning parameters for TD-LTE including PRACH, PCI, and UL DM RS. It provides details on:
1) PRACH planning including separating PRACH resources by time, frequency, or sequence to reduce interference between cells.
2) Recommendations for selecting PRACH preamble formats and configuration indexes based on cell range.
3) Guidelines for configuring PRACH frequency offset, cyclic shift, and root sequence index based on factors like PUCCH resources and number of preamble sequences needed.
Pci mod3,6,30 analysis and auto optimizationShuangquan Lei
This presentation introduce a network optimization platform, and with this application, system will support you to find 4G LTE cells which have PCI MOD(3), MOD(6) and MOD(30) collision, and then can generate candidate value list by big data analysis.
Please send email to me if this application can make your work more effective.
my email address: lei.shuangquan@gmail.com
The document provides an overview of NBAP (Node B Application Part) procedures. It discusses:
1. The Iub interface between RNC and Node B and how NBAP is used for signaling.
2. The main functions of NBAP including cell configuration management, transport channel management, and radio link management.
3. The different types of NBAP procedures including common procedures for tasks like cell setup/deletion and dedicated procedures for radio link management.
4. Key elements of NBAP communication like messages, information elements, and error handling.
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...Jean de la Sagesse
The document discusses key performance indicators (KPIs) for 2G and 3G networks and how top telecom vendors like Ericsson, Huawei, and NSN optimize parameters to improve these KPIs. It outlines techniques for reducing TCH blocking, SD blocking, TCH drop, HOSR, TASR, SD drop, and improving paging success rate through actions like changing configuration parameters, enabling features, addressing hardware issues, and optimizing cells physically. The optimization of these parameters can help maintain balance between network throughput, capacity and radio quality while ensuring a seamless transition between 2G and 3G.
The document discusses the random access channel (RACH) procedure in LTE networks. It covers:
1) The RACH procedure is used for initial access and synchronization between the UE and network. The physical random access channel (PRACH) is used to perform the initial access.
2) The RACH procedure is performed in scenarios like initial access, re-establishment, handover, and when uplink synchronization is lost.
3) The document provides details on the different steps of the contention-based and non-contention based RACH procedures.
The document discusses 4G LTE drive testing. It describes the necessary equipment for drive testing including a notebook, GPS, and LTE dongle. It outlines key LTE radio parameters that are measured like PCI, RSRP, SINR, and MIMO. It also discusses measuring UE state information, throughput, and LTE access procedures including attach requests, random access failures, and E-RAB failures. Finally, it compares the impact of ANR capabilities versus UE capabilities on measuring neighboring cells within and between eNodeBs.
This document discusses how the theoretical peak throughput of 300 Mbps for LTE systems is calculated. It provides background information on key aspects of the LTE physical layer that influence throughput calculations, including bandwidth, modulation schemes, coding rates, and duplexing methods. The document then examines the calculations for theoretical throughput for both Frequency Division Duplexing (FDD) and Time Division Duplexing (TDD) LTE systems.
This document contains parameters related to 2G cell configuration for an Axis network with 2247 sites and 19 BSCs. It includes common cell data parameters like AGBLK, MFRMS, ACCMIN, INDOOR_CELL values. It also includes locating cell filter data parameters like BSPWR, BSTXPWR, MSRXMIN, BSRXMIN for path loss calculation. Finally, it contains locating urgency cell data parameters like TALIM, PSSBQ, PTIMBQ, QLIMDL for handling call quality issues. The parameters need to be optimized for Axis' coverage-limited network.
The document discusses the requirements and configuration of Inter Frequency Load Balancing (IFLB) in LTE networks. IFLB aims to balance traffic load across cells on different frequencies by offloading user equipment between those cells. Key steps in IFLB include determining cell load, exchanging load information, selecting offload candidates, and handing users over to target cells if their signal quality is sufficient. The document provides guidance on setting parameters that control IFLB behavior and thresholds.
The document discusses optimization of PRACH/RACH power in LTE networks. It describes a feature that allows the network to automatically adapt PRACH power levels based on real network feedback to reduce interference. The feature works by measuring received interference power, updating PRACH power if interference changes significantly, and monitoring statistics to ensure power is high enough for UEs to access the network with minimal retransmissions while keeping interference low. Parameters control the power update thresholds and limits on signaling overhead from frequent updates.
It discusses about the 3G call flow scenarios for both the Circuit Switched (CS) and Packet Switched (PS). Calls are mobile originated. Call making and call tear down both are discussed.
What LTE Parameters need to be Dimensioned and OptimizedHoracio Guillen
How to Dimension user Traffic in 4G networks
What is the best LTE Configuration
Spectrum analysis for LTE System
MIMO: What is real, What is Wishful thinking
LTE Measurements what they mean and how they are used
How to consider Overhead in LTE Dimensioning and What is the impact
How to take into account customer experience when Designing a Wireless Network
This document provides instructions for using the AMOS command line interface. It describes how to launch AMOS from different interfaces and lists common commands for checking alarms, nodes, hardware, and connectivity in RNCs and NodeBs. Key information includes IP addresses and passwords for accessing different RNCs, commands for listing and blocking nodes, and checking Ranap and Rnsap connections between network elements.
This document specifies 5G RRC parameters including message definitions and information elements for timers, counters, constants, and UE variables. It defines RRC messages that may be sent on different logical channels and provides descriptions of message fields. It also specifies bandwidth part configurations, measurement reporting, reconfiguration messages, and beam failure recovery resources.
This document provides an overview of two fundamental mechanisms in LTE access networks: random access and buffer status reporting. It describes the random access procedure used by UEs to connect to the network, including the exchange of preambles, responses, and temporary identifiers. It also explains the buffer status reporting procedure, where UEs indicate to the base station the amount of data waiting to be transmitted so that uplink resources can be allocated. Key parameters for both mechanisms are defined in 3GPP specifications to optimize performance and control signaling in the network.
1. The PBCH is a downlink physical channel that broadcasts essential initial access parameters like system bandwidth. It occupies 72 subcarriers in the first 4 OFDM symbols of the second slot of every 10ms radio frame. The PBCH carries a 14-bit MIB that is coded at a low rate and mapped to center subcarriers.
2. The PCFICH indicates the number of OFDM symbols used for the PDCCH. It occupies 16 resource elements in the first symbol of each 1ms subframe. The PCFICH carries the CFI value which is coded to use the full 32 bits.
3. The PDCCH carries downlink control information like resource allocations using QPSK.
The document provides information on the fundamentals and evolution of 3G mobile communication standards. It discusses:
- 1st generation standards including AMPS, TACS, NMT, and others operating between 30-200 KHz.
- 2nd generation standards including GSM, IS-136, IS-95, and PDC operating at 200 KHz, utilizing TDMA and early digital technologies.
- UMTS (3G) evolution through 3GPP releases, utilizing WCDMA technology, and achieving speeds up to 2 Mbps through improvements like HSPA and LTE.
The document discusses various LTE measurement parameters and procedures including:
1. The eNB reports a list of detected PRACH preambles and measures timing advance, average RSSI, average SINR, UL CSI, and transport BLER for RRM purposes.
2. UE measurements include CQI, RSRP, and RSRQ while eNB measurements include timing advance, RSSI, SINR, UL CSI, detected preambles, and transport BLER. Inter-RAT measurements are also discussed.
3. Examples of RSRP, RSRQ, and timing advance procedures are provided along with CQI measurement details. PLMN selection, cell selection,
The document provides an overview and analysis flow for optimizing the performance of a mobile network. It discusses various problems that can occur like low availability of control channels, congestion on signaling and traffic channels, and high drop call rates. For each problem, it lists probable causes and recommends actions to identify the issue and solutions to resolve it, such as adjusting configuration parameters, adding network capacity, or improving frequency planning. MML commands are also provided to check device logs, resources, and performance statistics for troubleshooting purposes.
The document describes the Master Information Block (MIB) and System Information Blocks (SIBs) in 5G NR networks. It provides details on the contents and purpose of the MIB, SIB1, SIB2, SIB3, SIB4 and SystemInformation message. These messages contain essential system information for cell selection and access procedures in 5G networks.
Ericsson important optimization parametersPagla Knight
The document lists important optimization parameters for Ericsson including parameters related to system configuration, capacity management, directed retry, handover, HSDPA/EUL, IRAT, and idle mode selection and reselection. It provides descriptions of over 50 parameters that control aspects such as power levels, admission limits, thresholds for cell reselection, and criteria for measurements.
The document discusses key planning parameters for TD-LTE including PRACH, PCI, and UL DM RS. It provides details on:
1) PRACH planning including separating PRACH resources by time, frequency, or sequence to reduce interference between cells.
2) Recommendations for selecting PRACH preamble formats and configuration indexes based on cell range.
3) Guidelines for configuring PRACH frequency offset, cyclic shift, and root sequence index based on factors like PUCCH resources and number of preamble sequences needed.
Pci mod3,6,30 analysis and auto optimizationShuangquan Lei
This presentation introduce a network optimization platform, and with this application, system will support you to find 4G LTE cells which have PCI MOD(3), MOD(6) and MOD(30) collision, and then can generate candidate value list by big data analysis.
Please send email to me if this application can make your work more effective.
my email address: lei.shuangquan@gmail.com
The document provides an overview of NBAP (Node B Application Part) procedures. It discusses:
1. The Iub interface between RNC and Node B and how NBAP is used for signaling.
2. The main functions of NBAP including cell configuration management, transport channel management, and radio link management.
3. The different types of NBAP procedures including common procedures for tasks like cell setup/deletion and dedicated procedures for radio link management.
4. Key elements of NBAP communication like messages, information elements, and error handling.
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...Jean de la Sagesse
The document discusses key performance indicators (KPIs) for 2G and 3G networks and how top telecom vendors like Ericsson, Huawei, and NSN optimize parameters to improve these KPIs. It outlines techniques for reducing TCH blocking, SD blocking, TCH drop, HOSR, TASR, SD drop, and improving paging success rate through actions like changing configuration parameters, enabling features, addressing hardware issues, and optimizing cells physically. The optimization of these parameters can help maintain balance between network throughput, capacity and radio quality while ensuring a seamless transition between 2G and 3G.
The document discusses the random access channel (RACH) procedure in LTE networks. It covers:
1) The RACH procedure is used for initial access and synchronization between the UE and network. The physical random access channel (PRACH) is used to perform the initial access.
2) The RACH procedure is performed in scenarios like initial access, re-establishment, handover, and when uplink synchronization is lost.
3) The document provides details on the different steps of the contention-based and non-contention based RACH procedures.
The document discusses 4G LTE drive testing. It describes the necessary equipment for drive testing including a notebook, GPS, and LTE dongle. It outlines key LTE radio parameters that are measured like PCI, RSRP, SINR, and MIMO. It also discusses measuring UE state information, throughput, and LTE access procedures including attach requests, random access failures, and E-RAB failures. Finally, it compares the impact of ANR capabilities versus UE capabilities on measuring neighboring cells within and between eNodeBs.
This document discusses how the theoretical peak throughput of 300 Mbps for LTE systems is calculated. It provides background information on key aspects of the LTE physical layer that influence throughput calculations, including bandwidth, modulation schemes, coding rates, and duplexing methods. The document then examines the calculations for theoretical throughput for both Frequency Division Duplexing (FDD) and Time Division Duplexing (TDD) LTE systems.
This document contains parameters related to 2G cell configuration for an Axis network with 2247 sites and 19 BSCs. It includes common cell data parameters like AGBLK, MFRMS, ACCMIN, INDOOR_CELL values. It also includes locating cell filter data parameters like BSPWR, BSTXPWR, MSRXMIN, BSRXMIN for path loss calculation. Finally, it contains locating urgency cell data parameters like TALIM, PSSBQ, PTIMBQ, QLIMDL for handling call quality issues. The parameters need to be optimized for Axis' coverage-limited network.
The document discusses the requirements and configuration of Inter Frequency Load Balancing (IFLB) in LTE networks. IFLB aims to balance traffic load across cells on different frequencies by offloading user equipment between those cells. Key steps in IFLB include determining cell load, exchanging load information, selecting offload candidates, and handing users over to target cells if their signal quality is sufficient. The document provides guidance on setting parameters that control IFLB behavior and thresholds.
The document discusses optimization of PRACH/RACH power in LTE networks. It describes a feature that allows the network to automatically adapt PRACH power levels based on real network feedback to reduce interference. The feature works by measuring received interference power, updating PRACH power if interference changes significantly, and monitoring statistics to ensure power is high enough for UEs to access the network with minimal retransmissions while keeping interference low. Parameters control the power update thresholds and limits on signaling overhead from frequent updates.
It discusses about the 3G call flow scenarios for both the Circuit Switched (CS) and Packet Switched (PS). Calls are mobile originated. Call making and call tear down both are discussed.
What LTE Parameters need to be Dimensioned and OptimizedHoracio Guillen
How to Dimension user Traffic in 4G networks
What is the best LTE Configuration
Spectrum analysis for LTE System
MIMO: What is real, What is Wishful thinking
LTE Measurements what they mean and how they are used
How to consider Overhead in LTE Dimensioning and What is the impact
How to take into account customer experience when Designing a Wireless Network
This document provides instructions for using the AMOS command line interface. It describes how to launch AMOS from different interfaces and lists common commands for checking alarms, nodes, hardware, and connectivity in RNCs and NodeBs. Key information includes IP addresses and passwords for accessing different RNCs, commands for listing and blocking nodes, and checking Ranap and Rnsap connections between network elements.
This document specifies 5G RRC parameters including message definitions and information elements for timers, counters, constants, and UE variables. It defines RRC messages that may be sent on different logical channels and provides descriptions of message fields. It also specifies bandwidth part configurations, measurement reporting, reconfiguration messages, and beam failure recovery resources.
This document provides an overview of two fundamental mechanisms in LTE access networks: random access and buffer status reporting. It describes the random access procedure used by UEs to connect to the network, including the exchange of preambles, responses, and temporary identifiers. It also explains the buffer status reporting procedure, where UEs indicate to the base station the amount of data waiting to be transmitted so that uplink resources can be allocated. Key parameters for both mechanisms are defined in 3GPP specifications to optimize performance and control signaling in the network.
This document discusses uplink and downlink power control mechanisms in GPRS. It describes:
1) Open-loop power control where the mobile adjusts its power autonomously based on measurements of the downlink signal.
2) Closed-loop power control where the network can control the mobile's power either fully or partially based on measurements of the uplink or downlink signal.
3) The equation a mobile uses to calculate its transmit power, which is a function of parameters set by the network and can incorporate open or closed-loop control.
The document discusses GSM and GPRS system information that is broadcast by base stations to provide configuration details to mobile phones. It is organized into various system information types that contain parameters related to cell characteristics, neighboring cells, access control, and GPRS services. Type 1-4 are broadcast on the broadcast control channel, while types 5-6 are sent via the slow associated control channel during an active connection. The C1 and C2 cell reselection criteria used by mobile phones are also described.
This document describes a MATLAB code project on an FHSS (Frequency Hopped Spread Spectrum) system. It includes the theory of FHSS, block diagrams of the transmitter and receiver, and an explanation of the improved security method used. The project generates bit sequences, modulates the signal, creates an improved PN sequence, and performs frequency hopping to generate the spread signal. Output plots generated in MATLAB are included and analyzed. The results match the theoretical background. In conclusion, the document demonstrates implementing and analyzing an FHSS system in MATLAB to improve security.
This document provides an overview of GPS signal characteristics including:
- The GPS signal consists of L1 and L2 carrier frequencies modulated by pseudorandom codes and data.
- The C/A code identifies individual satellites and supports signal acquisition. The P-code provides higher accuracy but is encrypted as Y-code for military use.
- Navigation data transmitted includes ephemeris, almanac, clock and ionospheric data used to determine satellite positions and timing corrections.
All GSM base stations continuously broadcast system information messages containing parameters needed for mobile phones to access the network. This information includes details on neighboring cells, frequency allocations, access restrictions and more. It is transmitted using specific message types that are sent on dedicated control channels and contain various information elements. The document then describes the structure and contents of these system information messages and their information elements in detail.
The document discusses SDCCH (Standalone Dedicated Control Channel) configuration and usage in a GSM network. It describes:
- Possible SDCCH configurations including SDCCH/8, SDCCH/4, and combinations using 1 or 2 timeslots and TRXs.
- How logical channels like SDCCH, TCH, SACCH, and CBCH are mapped to physical timeslots and frames.
- The usage of SDCCH for functions like registration, call setup, SMS, and supplementary services.
- Parameters involved in SDCCH dimensioning like traffic estimations, congestion reasons and detection, and preventative actions.
This document provides an overview of how Sage Instrument's 8901A UCTT tool analyzes and measures metrics from 4G LTE signals. It can analyze signals from 1.4MHz to 20MHz bandwidth at up to 10 measurements per second. The tool automatically detects the number of transmit antenna ports and measures various signal characteristics including power levels, modulation quality, control channels, and physical channel allocation. It presents the LTE signals across several views to analyze aspects like frequency response, power levels over time, and signal constellations.
The document discusses various logical channels in GSM including broadcast channels (BCH), common control channels (CCCH), dedicated control channels (DCCH), and traffic channels (TCH). It describes the purpose and usage of different channel types like FCCH, SCH, BCCH, PCH, RACH, AGCH, SDCCH, SACCH, and FACCH. It also covers topics like call setup using SDCCH, burst structure, mapping of logical channels to physical channels, and SDCCH configuration and dimensioning.
WiFiRe is a system that extends the range of WiFi signals to 15-20 km using sectorized directional antennas to provide broadband wireless access to rural villages in India. It uses a single WiFi channel shared across all sectors, with a WiMAX-like MAC layer to coordinate multi-sector transmissions and guarantee quality of service for voice traffic. Key benefits are low cost using off-the-shelf WiFi components without requiring wireless spectrum licensing.
SIBs in LTE carry important system information that allows user equipment to access cells, perform cell reselection, and obtain information about neighboring intra-frequency, inter-frequency, and inter-RAT cells. There are 13 standardized SIB types in LTE, and SIB1 contains scheduling information for the other SIBs. SIB1 is transmitted every 80ms on the broadcast control channel, while the scheduling information it provides allows UE to determine the transmission timing of other SIBs, such as SIB2-SIB13, on the downlink shared channel.
lte-enodeb-s1-startup-sib-rrc-connection.pdfJunaid Alam
The document summarizes the sequence of events for an eNodeB performing an S1 setup with the EPC and then initiating broadcasts of system information blocks (SIBs) to UEs. It shows the eNodeB sending the RRC Connection Setup message containing UE specific configuration information. The eNodeB first establishes an S1 connection with the MME and then broadcasts the master information block and various SIBs. It then facilitates the random access procedure and sends the RRC Connection Setup message to the UE.
This document discusses channel concepts in GSM including logical channels like BCCH, CCCH, DCCH, TCH and their usage and mapping onto physical channels. It describes different channel configurations like SDCCH/8, SDCCH/4 and combinations. SDCCH are used for call setup, SMS, location updates. The document discusses bursts, frame structures, and concepts like hyperframe, multiframe that GSM is based on.
Fast detection of number of antenna ports in lte systemeSAT Journals
Abstract
In LTE system, during initial cell selection UE is unaware about the number of antennas used by eNB for transmission. So, UE blindly tries multiple times to detect the right number of antennas used for transmission in the system. This wastes lot of time and UE processing power, as UE needs to do channel estimation, equalization/demodulation, decoding process multiple times with assumption of 1 or 2 and 4 antenna ports each time.
The objective of this paper is to find out a faster and efficient method for detecting the number of antenna ports used by the eNB for signal transmission. A new method is explored for detecting the number of eNB transmit antennas before starting PBCH decoding and CRC checking by exploiting the presence of downlink reference signals at various Resource Element (RE) positions in the Resource Blocks (RB) and using the PBCH SFBC data patterns. This helps for faster detection of number of antennas used for transmission that in turn helps to reduce the UE power consumption as well as reduces the initial cell search time.
Keywords: UE- User Equipment, LTE- Long-Term Evolution, eNB- evolved Node B, RAT- Radio Access Technology, PBCH- Physical Broadcast Channel, SFBC- Space Frequency Block Codes, DL – Down Link.
System information messages contain data about the mobile network that mobile stations need to communicate with the network. There are 12 different types of system information messages that provide information like cell channel descriptions, neighboring cell information, location area identities, and parameters for random access channel control. These messages are continuously broadcast on common control channels to both idle and active mobile stations.
This document summarizes key radio parameters in GSM networks. It describes parameters for network identification like CGI and BSIC, which help identify cells and distinguish neighboring base stations. It also covers system control parameters for random access, including MAXRETRANS, Tx_Integer, and AC. Finally, it discusses cell selection parameters and network function parameters that control aspects like paging and location updating.
This presentation discusses GSM frame structure and logical channels. It covers GSM frequency bands and specifications, the multiple access methods of FDMA and TDMA, frame representations, and logical traffic and control channels including BCCH, CCCH, DCCH, and TCH channels. Frame structures include hyperframes, superframes, multiframes, and TDMA frames. Logical channel configurations and multiplexing of channels on timeslots are also summarized.
WR_BT03_E1_1 Channel Structure and Function-44.ppttunaVNP
The document discusses the structure and classification of channels in UMTS networks, including physical, transport and logical channels, and their mapping relationships. It also outlines the key steps in the cell search procedure used for network acquisition and synchronization, as well as an overview of the random access channel procedure.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
2. Cell search is the procedure for a UE to acquire time and frequency
synchronization with a cell and to detect Physical layer Cell ID (PCI) of the
cell, done by decoding SSB.
The Synchronization Signal/PBCH block (SSB) consists of PSS, SSS
and Physical Broadcast Channel (PBCH).
There are 1008 unique PCIs defined in 5G NR, double of that in LTE (504).
PCI of a cell can be calculated using;
NID
Cell = 3 * NID
(1) + NID
(2) where NID
(1) ∈ {0,1, … ,335} and NID
(2) ∈ {0,1,2}
The UE derives PCI group number NID
(1) from SSS and physical-layer
identity NID
(2) from PSS.
2
3. Time and
Frequency
Structure of
an SSB
SSS is in located the third OFDM symbol and span over 127 subcarriers. There are 8 un-used
subcarriers below SSS and 9 un-used subcarriers above SSS.
3
4. SSS is in the third OFDM symbol and span over 127 subcarriers. There are
8 un-used subcarriers below SSS and 9 un-used subcarriers above SSS.
PBCH occupies two full OFDM symbols (second and fourth) spanning 240
subcarriers and in the third OFDM symbol spanning 48 subcarriers below
and above SSS. This results in PBCH occupying 576 subcarriers across three
OFDM symbols (240+48+48+240 = 576).
PBCH DM-RS occupies 144 REs which is one-fourth of total REs and
remaining for PBCH payload (576-144 = 432 REs).
Location of PBCH DM-RS depends upon PCI (v = NID
cell mod 4) of the cell
(PCI already determined by the UE using PSS/SSS)
4
5. Channel or Signal OFDM symbol number ‘l’ relative to the start of an SSB
Subcarrier number ‘k’
relative to the start of an SSB
PSS 0 56, 57, ..., 182
SSS 2 56, 57, ..., 182
Set to ‘0’ 0 0, 1, ..., 55, 183, 184, ..., 239
2 48, 49, ..., 55, 183, 184, ..., 191
PBCH 1, 3 0, 1, ..., 239
2
0, 1, ..., 47,
192, 193, ..., 239
DM-RS for PBCH 1, 3 0+v, 4+v, 8+v,...,236+v
2
0+v, 4+v, 8+v,…,236+v
192+v, 196+v,...,236+v
5
6. SSB details in Time Domain
Each SSB spans across 4 OFDM symbols in the time domain.
An SSB is periodically transmitted with a periodicity of 5ms, 10ms, 20ms, 40ms, 80ms or
160ms.
While longer SSB periodicities enhances network energy performance, the shorter
periodicities facilitate faster cell search for UEs. Longer SSB for FR2 and Shorter SSB for FR1
A UE can assume a default periodicity of 20ms during initial cell search or idle mode mobility (
what if it not 20 ms?)
To enable beam-sweeping for PSS/SSS and PBCH, SS burst sets are defined. An SS burst
set comprised of a set of SSBs, each SSB potentially be transmitted on a different beam.
SS burst set consists of one or more SSBs.
SSBs in the SS burst set are transmitted in time-division multiplexing fashion.
An SS burst set is always confined to a 5ms window and is either located in first-half or in the
second-half of a 10ms radio frame.
6
7. The maximum number of
candidate SSBs (Lmax) within an
SS burst set depends upon the
carrier frequency/band as
shown in the table below.
Q: For 30khz SCS, how many
symbols present in 5ms?
Carrier Frequency
Max. No. of Candidate SSBs
within SS Burst Set (Lmax)
fc ≤ 3 GHz* 4
3 GHz* < fc ≤ 6 GHz 8
fc > 6 GHz 64
*SCS = 30 kHz case: for paired spectrum, 3 GHz, for
spectrum, 2.4 GHz is used
7
8. Within a 5ms half frame, the starting OFDM symbol index for a candidate SSB within SS burst set depends upon subcarrier spacing
(SCS) and carrier frequency/band (summarized in the below table). See section 4.1 from 38.213 for full details
How many slots in a 120Khz SCS?
SCS
OFDM starting symbols of the
candidate SSBs
fc ≤ 3 GHz*
Lmax = 4
3 GHz* < fc ≤ 6 GHz
Lmax = 8
fc > 6 GHz
Lmax = 64
CaseA:
15 kHz
{2,8} + 14n n = 0,1 {2,8,16,22}
n = 0, 1, 2,
3 {2,8,16,22,30,36,
44,50}
NA
CaseB:
30 kHz
{4,8,16,20} + 28n n = 0 {4,8,16,20}
n = 0, 1 {4,8,16,20,32,36,
44,48}
NA
CaseC:
30 kHz
{2,8} + 14n
n = 0,
1 {2,8,16,22}
n = 0, 1, 2,
3 {2,8,16,22,30,36,
44,50}
NA
CaseD:
120 kHz
{4,8,16,20} + 28n NA NA
n=0,1,2,3,5,6,7,8,10,11,12,13,15,
16,17,18
{4,8,16,20 … 508,512,520,524}
CaseE:
240 kHz
{8,12,16,20,32,36,40,44} + 56n NA NA
n=0,1,2,3,5,6,7,8
{8,12,16,20 … 480,484,488,492}
8
9. Frame Synchronization:
Due to beamforming of SSBs, a UE wouldn’t be able to decode all SSB at
the same time. The received SSB might be anywhere within the SS burst
set, which means that the UE can’t determine the relative location of the
SSB in time, so no frame synchronization yet.
In order for the frame synchronization to be achieved, the MIB includes a
time index so that the UE knows the relative position of the SSB in time.
SSB index together with half-frame bit value embedded in PBCH helps
the UE to calculate frame boundary.
9
11. UE shall assume the reference-signal sequence r(m) for an SS/PBCH block is
defined by
Where c(n)is given by clause 5.2. The scrambling sequence generator shall
be initialized at the start of each SS/PBCH block occasion with
11
12. MIB ::= SEQUENCE {
systemFrameNumber BIT STRING (SIZE (6)), => 6 bits
subCarrierSpacingCommon ENUMERATED {scs15or60, scs30or120}, => 1 bit
ssb-SubcarrierOffset INTEGER (0..15), => 4 bits
dmrs-TypeA-Position ENUMERATED {pos2, pos3}, => 1 bit
pdcch-ConfigSIB1 INTEGER (0..255), => 8 bits
cellBarred ENUMERATED {barred, notBarred}, => 1 bit
intraFreqReselection ENUMERATED {allowed, notAllowed}, => 1 bit
spare BIT STRING (SIZE (1)) => 1 bit
}
BCCH-BCH-MessageType indication 1 Bit
Ref: 38.331
Total of :23rBits
Q: SFN Range?
12
13. PBCH carries critical information required for further system access (e.g. to
acquire SIB1). In this section, all the information/fields included in MIB and the
information that is carried by PBCH (excluding MIB contents) are discussed in
detail.
MIB contents are same over 80ms period and same MIB is transmitted over all
SSBs within the SS burst set. The information such as SSB index is unique and
dedicated to an SSB, so MIB can’t carry such information and hence the
approach of carrying some of the information over PBCH outside of MIB is
adapted.
PBCH payload size including 24-bit CRC is 56-bits. The following table
summarizes the number of bits occupied by the information/field within
PBCH/MIB.
13
14. Information/field
Number of Bits
Total Carried by MIB
Carried by PBCH (excluding
MIB contents)
System Frame Number (SFN) 10 6 4
Sub Carrier Spacing (for SIB1, Initial access Msg-2/4, paging,
SI-messages)
1 1 0
SSB Subcarrier Offset
FR1 ____ 5
4
1
FR2 ____ 4 0
dmrs-TypeA-Position 1 1 0
PDCCH Config for SIB1 8 8 0
Cell Barring Information flag 1 1 0
Intra-Frequency Reselection allowed/not allowed flag 1 1 0
SSB Index
FR1 ____ 0
0
0*
FR2 ____ . 3 3*
half-frame bit 1 0 1
Spare bits 1 1 0
Reserved bits
FR1 ____ 2
0
2
FR2 ____ 0 0
BCCH-BCH-MessageType indication 1 1 0
CRC bits 24 0 24
Total Number of bits 56 (FR1 or FR2) 24 32 (FR1 or FR2)
14
15. SFN (6-bits): Similar to LTE, SFN in 5G NR takes 10 bits and ranges from 0 to 1023. The 6 MSB bits of
the 10-bit SFN are part of MIB. The 4 LSB bits of the SFN are conveyed in the PBCH transport block as
part of channel coding.
subCarrierSpacingCommon (1-bit): Carried within MIB. Subcarrier spacing used for SIB1, Msg-2/4 for
initial access, paging and broadcast of SI-messages. This bit indicates either 15 kHz or 30 kHz for FR1
and either 60 kHz or 120 kHz for FR2
SSB Subcarrier Offset (4 or 5-bits): Corresponds to kSSB, which is the frequency domain offset between
SSB and the overall resource block grid in number of subcarriers. For reception of SIB1, the UE needs
know where the overall resource block grid starts. This field takes 5 bits for FR1 and 4 bits for FR2
Only 4 bits are carried by MIB parameter ssb-SubcarrierOffset.
For FR1, 4 LSBs of kSSB are obtained from MIB parameter ssb-SubcarrierOffset and an additional bit
(MSB) is
encoded within PBCH to represent 24 values (0, 1, 2, …,23).
For FR2, 4 LSBs of kSSB are obtained from MIB parameter ssb-SubcarrierOffset to represent 12 values
1, 2, …,11).
This may also indicate that this cell does not provide SIB1 and that there is hence no CORESET#0
configured in MIB. In this case, the field pdcch-ConfigSIB1 indicates the frequency positions where the UE
may find SSB with SIB1 or the frequency range where the network does not provide SSB with SIB1. The UE
determines from MIB that a CORESET#0 is not present if kSSB > 23 for FR1 or if kSSB > 11 for FR2
15
16. dmrs-TypeA-Position (1-bit): Carried within MIB. This field defines the position of first DM-RS symbol for
downlink (PDSCH) and uplink (PUSCH);
For downlink, this bit is only relevant for PDSCH mapping Type A. The position of first DM-RS symbol is set to 3
if dmrs-TypeA-Position is set to pos3 and is set to 2 if dmrs-TypeA-Position is set to pos2.
For uplink, this bit is only relevant for PUSCH mapping Type A. The position of first DM-RS symbol is set to 3 if
dmrs-TypeA-Position is set to pos3 and is set to 2 if dmrs-TypeA-Position is set to pos2.
pdcch-ConfigSIB1 (8-bits): Carried within MIB. This field is used to configure CORESET#0 and search space#0 (of
the initial BWP) which is the most important information the UE should know in order for it to monitor for
scheduling (PDCCH) of SIB1.
This CORESET configuration also provides and activates the initial bandwidth part in the downlink.
If the field ssb-SubcarrierOffset indicates that SIB1 is absent (explained above), the field pdcch-ConfigSIB1 indicates
the frequency positions where the UE may find SSB with SIB1 or the frequency range where the network does not
provide SSB with SIB1.
• cellBarred (1-bit): Carried within MIB. This field indicates whether or not UEs in the cell are allowed to access the
cell; ‘barred’ indicates, the UEs are not allowed to access the cell.
• intraFreqReselection (1-bit): Carried within MIB. This field controls cell selection/reselection to intra-frequency
cells when the highest ranked cell is barred (as indicated by cellBarred) or treated as barred by the UE.
• SSB Index (0 or 3-bits): This information is not conveyed by MIB, instead, PBCH payload carries the required 3 bits.
Index of the SSB within SSB burst set which is very important piece of information for achieving frame
synchronization. The maximum number of candidate SSBs (Lmax) within an SS burst set depends upon the carrier
frequency
16
17. SSB Index for less than sub-6 GHz : Each one of the 4/8 PBCH scrambling sequences
(section 7.3.3.1 from 38.211) used for PBCH scrambling implicitly indicates 1-out-of-4/8
SSB indices. In this case, there is no need of explicit bits to indicate SSB index.
SSB Index for above 6 GHz(Lmax = 64): Each one of the 8 PBCH scrambling sequence
(section 7.3.3.1 from 38.211) used for PBCH scrambling implicitly indicates 3 LSB bits of
SSB index. In order to represent 64 SSB indices, another 3 bits (MSB) are required which
are explicitly carried by PBCH payload.
half-frame bit (1-bit): This bit is set to ‘0’ if SSB is transmitted in the first half-frame of the
10ms frame or set to ‘1’ if SSB is transmitted in the second half-frame of the 10ms frame.
17
18. SSB details in Frequency Domain
In LTE, the frequency domain position of PSS/SSS is always fixed around carrier center
frequency. In NR, based on the frequency band, a set of possible frequency locations
for SSB are defined, this is called synchronization raster. The UE only need to search
for SSB on this raster, called as GSCN(Global Synchronization Channel Number)
Unlike in the case of LTE, the UE doesn’t need to search for SSB on all carrier raster
positions, instead the UE just need to search for SSB in a sparser synchronization
raster.
UE needs to search SSB based on ARFCN raster, it would take too long time since
ARFCN raster is very narrow. So it would be good to define a SSB searching frequency
in wider steps. This is the usage/purpose of GSCN.( In general 100Khz Frequency raster
for FR1 & 60/120KHz Frequency raster in FR2)
In case of GSCN, as you see in the following table, the granularity is 50 or 150 or 250
Khz under 3Ghz and it has the granularity of 1.44 Mhz in above 3 Ghz frequency
range and below 24.25Ghz, and the granuilirity jumps to 17.28 Mhz if the frequency
goes over 24.25 Ghz.
18
19. The SSB is not RB aligned with the resource block grid. Instead, there is an arbitrary offset
between the edge of the SSB RBs and the edge of the resource block grid.
Frequency range SS block frequency position GSCN Range of GSCN
0 – 3000 MHz
N * 1200kHz + M * 50 kHz
N=1:2499, M={1,3,5} (Default
M=3)
3N + (M-
3)/2
2 – 7498
3000 – 24250 MHz
3000 MHz + N * 1.44 MHz
N= 0:14756
7499 + N 7499 – 22255
24250 – 100000 Mhz
24250.08 MHz + N * 17.28 MHz,
N = 0:4383 22256 + N 22256 – 26639
< 38.104 v15.7.0 - Table 5.4.3.1-1: GSCN parameters for the global frequency raster >
19
21. Point A serves as a common reference point for resource block grids. For all subcarrier
spacings, the lowest subcarrier (subcarrier #0) of Common RB #0 (discussed later) is
referred to as Point A.
After decoding SSB, the UE doesn’t automatically know starting PRB of the bandwidth
part. The UE needs to first determine the position of Point A using one of the following
parameters;
1. offsetToPointA represents frequency offset between Point A and the lowest subcarrier
of the common resource block which overlaps with the start of SSB. This field is provided
by the network via FrequencyInfoDL-SIB as part of SIB1.
2. absoluteFrequencyPointA represents the frequency-location of point A expressed as
in ARFCN. It provides absolute frequency position of the reference resource block
(Common RB 0) whose lowest subcarrier is Point A.
21