UMTS (Universal Mobile Telecommunications System) is the 3G mobile communication standard used in Europe and other parts of the world. It uses Wideband Code Division Multiple Access (W-CDMA) technology which spreads user signals across a wide frequency band using unique codes. UMTS allows for higher data rates and new multimedia services compared to 2G systems. Key aspects of UMTS include the use of orthogonal variable spreading factor codes to separate channels, different frequencies for uplink and downlink, and millions of unique scrambling codes to separate users. Capacity is estimated using metrics like signal to interference ratio, processing gain, and the ratio of bit energy to noise density which depends on factors like spreading factor.
Abis Over IP/Abis Optimization on-site Workshopetkisizcom
Recognize new system architecture
Understand the dimensioning rules using the Abis planning tools
Activate the Abis over IP
Activate the Abis Optimization
Use the Performance Monitoring
UMTS/3G RAN Capacity Management Guideline Part-02 (Sectorization))Md Mustafizur Rahman
UMTS RAN capacity management is one of the Key activities to maintain the good QoS & stability of the 3G system. A relatively high load can affect the accessibility, coverage and QoS of established services. The capacity, coverage and QoS of the WCDMA system are mutually affected. Hence, for a stable & good quality 3G network, UMTS capacity need to be monitored, expanded & manage regularly.
In the first part of document (Part-1) UMTS soft capacity management along with the correlation between capacity vs accessibility, UMTS expansion threshold, counters & effective mechanism of UMTS Soft capacity management have been depicted. This part of the Document is focused on UMTS Hard Expansion Methodology. 3G Capacity management by Sectorization has been explained thoroughly.
After completing this, you will be able to gain knowledge on 3G Expansion Parameters, 3G Expansion Threshold, Capacity Gain, Cost vs Capacity Gain by Sectorization. Moreover, you will be familiar with Planning, Optimization & Post Performance activities of Sectorization.
Abis Over IP/Abis Optimization on-site Workshopetkisizcom
Recognize new system architecture
Understand the dimensioning rules using the Abis planning tools
Activate the Abis over IP
Activate the Abis Optimization
Use the Performance Monitoring
UMTS/3G RAN Capacity Management Guideline Part-02 (Sectorization))Md Mustafizur Rahman
UMTS RAN capacity management is one of the Key activities to maintain the good QoS & stability of the 3G system. A relatively high load can affect the accessibility, coverage and QoS of established services. The capacity, coverage and QoS of the WCDMA system are mutually affected. Hence, for a stable & good quality 3G network, UMTS capacity need to be monitored, expanded & manage regularly.
In the first part of document (Part-1) UMTS soft capacity management along with the correlation between capacity vs accessibility, UMTS expansion threshold, counters & effective mechanism of UMTS Soft capacity management have been depicted. This part of the Document is focused on UMTS Hard Expansion Methodology. 3G Capacity management by Sectorization has been explained thoroughly.
After completing this, you will be able to gain knowledge on 3G Expansion Parameters, 3G Expansion Threshold, Capacity Gain, Cost vs Capacity Gain by Sectorization. Moreover, you will be familiar with Planning, Optimization & Post Performance activities of Sectorization.
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
TEDx Manchester: AI & The Future of WorkVolker Hirsch
TEDx Manchester talk on artificial intelligence (AI) and how the ascent of AI and robotics impacts our future work environments.
The video of the talk is now also available here: https://youtu.be/dRw4d2Si8LA
INVESTIGATION OF UTRA FDD DATA AND CONTROL CHANNELS IN THE PRESENCE OF NOISE ...ijngnjournal
In this paper, the main aim is to design and simulate UTRA FDD control channel in the presence of noise and wireless channel by using FDD library/Matlab box set that can be used to design and implement some
systems. Moreover, a test and verification of the library is achieved with different channel models such as Additive White Gaussian Noise (AWGN), fading and moving channel models. FDD library are employed to design whole transmitter and receiver. Then we had tested AWGN channel and some other channel models.
Also we illustrated what are control channels DCCH and the other one as understanding the whole system. Moreover, the standards have been covered as well as implemented the whole transmit and receive chain plus the generation of DPCH, DPCCH channel. we had tested the performance against the AWGN noise.
Then we have studied different channel models that are defined in the standard, used the few of them like the fading channel and moving channel. We have tried to compare the performance in terms of Monte Carlo simulation by producing the BER curves. We have also change some channel parameters like phase, number of multipaths and we have tried to see the performance of the model in the presence of actual channel model.
CDMA Transmitter and Receiver Implementation Using FPGAIOSR Journals
Abstract: Code Division Multiple Access (CDMA) is a spread spectrum technique that uses neither frequency channels nor time slots. With CDMA, the narrow band message (typically digitized voice data) is multiplied by a large bandwidth signal that is a pseudo random noise code (PN code). All users in a CDMA system use the same frequency band and transmit simultaneously. The transmitted signal is recovered by correlating the received signal with the PN code used by the transmitter. The DS - CDMA is expected to be the major medium access technology in the future mobile systems owing to its potential capacity enhancement and the robustness against noise. The CDMA is uniquely featured by its spectrum-spreading randomization process employing a pseudo-noise (PN) sequence, thus is often called the spread spectrum multiple access (SSMA). As different CDMA users take different PN sequences, each CDMA receiver can discriminate and detect its own signal, by regarding the signals transmitted by other users as noise- like interferences. In this project direct sequence principle based CDMA transmitter and receiver is implemented in VHDL for FPGA. Modelsim 6.2(MXE) tool will be used for functional and logic verification at each block. The Xilinx synthesis technology (XST) of Xilinx ISE 9.2i tool will be used for synthesis of transmitter and receiver on FPGA Spartan 3E. Keywords: CDMA, DSSS, BPSK, GOLD code.
This tutorial has been designed for audiences with a need to understand the LTE technology basics in very simple terms. This tutorial will give you enough understanding on LTE technology from where you can take yourself at higher level of expertise.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The tutorial is designed for all those readers who are planning or pursuing the CDMA course to make their career in this field. However, it is also meant for the common readers who simply want to understand − what is CDMA Technology?
Team D1Team D Modulation ApplicationsMay1, 2015.docxmattinsonjanel
Team D 1
Team D Modulation Applications
May1, 2015
Aslam Modak
NTC/362
Modulation Applications
There are several variances between analog and digital transmission technologies and it is crucial to comprehend how conversions between the two technologies occur. An analog signal is describe as being constantly variable along amplitudes and frequencies. On the other hand, digital transmissions is very different from its analog transmissions. One difference is the signal is considerable simpler. Rather than being constantly a variable wave form, it is a series of separate pulses that represent one and zeros. As for example, each computer utilizes a coding scheme that outlines what arrangement of ones and zeros create all characters in a character set, which includes upper and lower case letters, special characters, and keyboard control functions (Goleniewski, 2015). Furthermore, there are many technologies covert the two signals on both directions, meaning analog-to-digital and digital-to-analog. This is the case of a two converters DAC and ADC technologies. An ADC is the device that coverts or transforms a continuous physical quantity (voltage) to a digital number that presents the quantity’s amplitude. ADCs covers digital data into an analog signal such as a current or voltage. These converters are found on most electronic devices that plug to the electric outlet. They are microchips integrated on the circuit board of the electronic device.
There are several types of modulation applications. These applications are amplitude, frequency, phase and QAM modulation. They all serve different but important purposes. Along with these purposes there are also advantages and disadvantages.
Amplitude modulation (AM) is used in a variety of applications. Although use of the modulation is not relied upon currently as it was used in the past, you can still find it in its basic form. When an AM modulated signal is created, the amplitude of the signal is varied in line with the variations in intensity of the sound wave. AM is the most straightforward way of modulating a signal. Some of the advantages are, it is simple to implement, an AM signal is efficient in terms of its power usage, and it can be demodulated using a circuit consisting of a very few components. Disadvantages are AM signals are prone to high levels of noise because most noise is amplitude based and AM detectors are sensitive to it.
Frequency Modulation (FM) is used in a wide variety or radio communication applications from broadcasting, two way radio communications links, and mobile radio communications. It possesses many advantages over AM. For example, it is resilient to noise. FM that has been utilized by the broadcasting industry is the reduction in noise. FM Does not require linear amplifiers in the transmitter. Disadvantages are it requires more complicated demodulator. Some other modes have higher data spectral efficiency.
Phase Modulation (PM) is a form of modulati ...
ABSTRACT : Performance enhancement of smart antennas versus their complexity for commercial wireless
applications. The goal of the study presented in this paper is to investigate the performance improvement
attainable using relatively simple smart antenna techniques when applied to the third-generation W-CDMA air
interface. Methods to achieve this goal include fixed multi beam architectures with different beam selection
algorithms (maximum power criterion, combined beams) or adaptive solutions driven by relatively simple direction
finding algorithms. After comparing these methods against each other for several representative scenarios, some
issues related to the sensitivity of these methods are also studied, (e.g., robustness to environment, mismatches
originating from implementation limitations, etc.). Results indicate that overall, conventional beam forming
seems to be the best choice in terms of balancing the performance and complexity requirements, in particular
when the problem with interfering high-bit-rate W-CDMA 3g users is considered.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Umts fundamentals
1. 1 Beneficiario COLFUTURO 2003
1. Appendix: UMTS
fundamental concepts
1.1 What is UMTS?
UMTS (Universal Mobile Telecommunications System) represents the
choice for the 3rd
Generation Global Mobile Communications System in
several countries/regions including almost all European countries, Japan
and Australia. 3rd
Generation mobile communication systems are intended
to provide advanced global services to the customer, either circuit-
switched (e.g. speech and new services like video calls) or packet-
switched, new mobile multimedia services (e.g. streaming/mobile TV,
location based services, Downloads, multi-user games and many more)
giving more flexibility for the operator to introduce these new services to
its portfolio and from the user point of view, more service choices and a
variety of higher, on-demand data rates compared with current 2-2.5G
mobile systems. The “global” feature means that the system is designed
to reach global coverage (if required) through the use of Satellite Links,
Macro-cells, Micro-Cells and Pico-Cells.
From the Standards point of view, UMTS is a mobile communications
system standardized by the 3GPP and the specifications are at the present
time in their Release Number 6. The mobile operators that bought 3G
licenses in Europe have already deployed their UMTS W-CDMA (Wideband
CDMA: the chosen multiple access technology for UMTS) based networks,
although the coverage is still not comparable with the currently huge,
transnational coverage of GSM-GPRS networks. In fact, at least in the first
years of deployment, UMTS networks are going to rely on GSM networks
to reach zones where there is still no UMTS coverage, using a technique
called Inter-RAT (RAT: Radio Access Technology) handovers.
About the UMTS services, some commercial services have been available
for the general customers, in the concrete case of The Netherlands, since
the last year.
1.2 Technical characteristics
Technically speaking, the radio-access part (also called “the air interface”)
is the most important difference regarding to the so-called 2-2.5G
systems (e.g. GSM, GSM+GPRS). Instead of using the FDMA-TDMA
combination (i.e. carriers and timeslots per carrier) as the access
technology like in GSM, UMTS uses Wideband-CDMA, a technology based
on the Direct Sequence (DS) Spread Spectrum principle. Direct Sequence
makes reference to the usage of a special code to separate the signals
(opposite to “frequency hopping” which is the other Spread Spectrum
2. A.F. COSME. UMTS CAPACITY SIMULATION STUDY
2
method and which is used for instance in Bluetooth technology). Spread
Spectrum means that because of the special signal processing method of
CDMA, the original information signal is spread in the frequency domain
within the wider frequency range of the W-CDMA channel.
In W-CDMA Systems, users belonging to a cell are separated by codes
(i.e. special sequences of bits) and not by timeslots as in TDMA (timeslots
in W-CDMA systems timeslots are not used for user separation, but to
support periodic functions, e.g. UE reception of power control commands
each timeslot).
Another characteristic of W-CDMA is that the users share the complete
frequency spectrum of near 5 MHz per UMTS channel all the time during
their communication.
In general, in CDMA systems, the way the uplink (i.e. mobile station to
base station transmission) and downlink (i.e. base station to mobile
station transmission) connections are separated is referred either by FDD
(Frequency Division Duplex) or TDD (Time Division Duplex) modes
respectively.
For the UMTS public mode (W-CDMA), the choice has been the FDD mode,
which uses different frequencies for both uplink and downlink (i.e. the
mobile transmits in one frequency and receives in another). FDD is used
for large outdoor cells because it can support more users than TDD mode.
TDD uses the same frequency but different timeslots for each type of
connection (UL-DL) and W-CDMA in TDD mode is intended to provide
private indoor low-range communications.
In practice, an operator needs 2 to 3 channels (2x5x2 or 2x5x3 MHz) to
be able to build a high-speed, high-capacity network, probably using a
layering approach, such as the so-called Hierarchical Cell Structure (HCS)
scenarios, using different carriers for micro-cells and macro-cells. In the
next graph, we can see the allocated spectrum in the concrete case of The
Netherlands [Umtsworld].
Figure 1-1: Allocated UMTS spectrum in The Netherlands
About the code usage, it is important to mention that CDMA requires two
kinds of codes for its operation: channelization (spreading) code and
3. 3 Beneficiario COLFUTURO 2003
scrambling code. The usage of these codes depends on the direction of
the communication (in Uplink, the transmitter is the mobile whereas in
Downlink the transmitter is the Base station). The purpose of the
channelization (spreading) codes in both UL and DL directions is to
separate channels from a single transmitter, whereas the purpose of the
scrambling codes is to separate transmitters (also applies to both UL and
DL directions).
The main difference in the frequency domain between both kinds of codes
is that the Scrambling codes don’t modify the bandwidth of the
Information Signal, whereas the channelization codes do. As this is
something very important in order to understand how UMTS works, in the
next section the code usage is explained both in UL and DL.
1.3 Channelization (Spreading) codes
In UL direction (UE transmits and Node B receives), channelization codes
are used to separate physical data and control (i.e. signaling) channels
from the same terminal. In DL (Node B transmits, UE Receives),
channelization codes are used to separate connections to different users
within one cell (users of the cell are sharing the “code tree” of that cell,
that is, the pool of DL code resources of the tree). Once a channelization
code is applied to the information signal, the Bandwidth of the information
signal changes (in frequency domain) to a higher bandwidth, in other
words is “spread” over the UMTS bandwidth channel (hereby the name of
“spread spectrum”).
In time domain, the effect is the change of rate of the information signal.
To distinguish from the Information Rate, 3GPP calls the Rate of the
channelization code as the Chip Rate, although physically the chips are
also bits (although of higher frequency (smaller period) than the data or
information bits). Therefore, after the channelization code is applied to the
information signal, the result is a signal with a bit rate equal to the chip
rate (the reference chip rate in UMTS is fixed to 3.84 Megachips / sec, and
varying the number of chips per information bit we obtain different user
speeds). The next figure helps to clarify the effects of the channelization
code in both frequency and time domain.
4. A.F. COSME. UMTS CAPACITY SIMULATION STUDY
4
Figure 1-2: Effects of the channelization code in Time and Frequency domain
The codes used for the channelization operations must have a special
property called orthogonality. Orthogonal code means that the inner
product of the code with the codes from the other users (called cross-
correlation property) or the product of the code with a shifted version of
the code itself (called auto-correlation) has to be as small as possible.
These codes are also known as OVSF (Orthogonal Variable Spreading
Factor) codes.
For orthogonality to work, the signals must be properly synchronized in
time. That’s why in DL for instance, due to multi-path propagation, some
of the orthogonality property is lost. This is had into account in CDMA
capacity equations with the so-called orthogonality factor, which is a
factor that varies between 0 (full orthogonality, no interference) and 1 (no
orthogonality, full interference)*
.
The number of chips used for each data bit is known as the spreading
factor (SF). Also, in the frequency domain, SF = W / R, where W =
Bandwidth of the spread signal [Hz] and R = Bandwidth of baseband data
[Hz].
Summarizing, in Time Domain:
SF = Chip Rate / Data Rate coded channel (A1.1)
And also, in Frequency Domain:
SF = W / R (A1.2)
*: This definition is in line with the definition in Wines simulator documentation. However in some
other references, for instance [Holma], 0 means no orthogonality and 1 means full orthogonality.
Where Data Rate coded channel means that this data rate has into account
the overhead introduced by coding techniques and it doesn’t corresponds
Bandwidth
after spreading
f
t
1
-1
Voltage
Power
Bandwidth of baseband
5. 5 Beneficiario COLFUTURO 2003
directly to the information rate (unless the coding factor is 1 of course).
This is important to know because it is a common source of mistakes in
calculations.
If we have a low spreading factor it means that it is consuming more code
resources from the code tree and the bit rate is higher, for instance with
SF = 8, the data rate of the spread signal would be 480 Kbps, whereas
with SF=256, the data rate of the spread signal would be 15 Kbps.
Therefore, in Downlink, the number of codes (given by the maximum SF)
is a scarce resource that can be in shortage and therefore must be
carefully considered in any capacity analysis.
1.4 Scrambling codes
Scrambling codes separate different mobiles (in uplink) and different
Node-B cells/sectors (in downlink). This is a code that does not affect the
transmission bandwidth which was already transformed by the usage of
the channelization code. The codes used for scrambling codes are known
as Gold codes and there are two versions (long and short) depending on
the features of the terminal/Node B either one or another version is used.
In Uplink, the number of codes available is in the order of millions of
codes (that guarantees no code shortage when trying to separate the
transmitting users), but in Downlink this number is limited to 512;
otherwise the cell-search procedure shouldn’t be possible to solve in a
reasonable time.
Finally, in the reception side the same transmitter’s channelization code is
applied and that allows the receiver to reconstruct the original transmitted
signal. W-CDMA also involves a certain degree of security, in the sense
that without the transmitter’s channelization code available, it is almost
impossible to reconstruct the original signal, thus preventing tampering
attacks in the air interface.
Summarizing, the following schematic illustrates in a simple way the
process of transmission and reception in UMTS involving all the elements
mentioned.
Spreading
code
Data bits
Scrambling
code
Transmission medium Σ
Recovered
bits
RX
SIDE
TX
SIDE
Scrambling
code
Spreading
code
Figure 1-3: Simplified Transmission and Reception process in UMTS
6. A.F. COSME. UMTS CAPACITY SIMULATION STUDY
6
As the radio access part has changed with respect to previous 2-2.5G
systems as GSM-GPRS, new methods have to be developed to estimate
capacity and coverage of the W-CDMA system.
1.5 The processing Gain, SIR (Signal to Interference
Ratio) and Eb/No concepts in UMTS [Vourekas]
Consider a single-cell CDMA system with N users where ideal power
control is applied and consequently the signal from all the users reaches
the node B demodulator with the same intensity S (figure 1-4).
The demodulator of the Node B processes one desired signal S, and N-1
interfering signals with total power equal to S*(N-1). The desired signal is
shown in the graph as a continuous line and the rest in dotted lines. The
interference sums up to (N-1)* S.
The signal-to-interference power ratio, denoted SIR, is then:
( ) ( )1
1
1 −
=
−
=
NSN
S
SIR (A1.3)
The bit energy to noise ratio, denoted as Eb/No, is obtained by dividing the
signal power by the information (baseband) bit rate, and the interference
power by the total RF frequency.
Figure 1-4: Derivation of the SIR and Eb/No relationship
N users
7. 7 Beneficiario COLFUTURO 2003
( ) ( ) R
W
N
W
SN
R
S
N
E rf
rf
o
B
⋅
−
=
−
=
1
1
1
(A1.4)
In the last part of equation (A1.4), the first term is equal to the signal to
interference ratio (as defined in equation A1.3) and the second term is
defined as the processing gain:
R
W
nBitRateInformatio
dBandwidthTotalSprea
G
rf
p == (A1.5)
Comparing (A1.5) with (A1.2), we see that the definition of Gp is
equivalent to the definition of SF. The processing gain is a Gain achieved
at the receiver during the de-spreading process and it is due to the fact
that the W-CDMA receiver can sum-up coherently the multiple copies of
the original data generated by the multi-path propagation, by means of a
special receiver technique known as Rake Receiver. Therefore, making the
equivalence between SF and Gp, we can say that the high data rate
transmissions have low processing gain (low spreading factor).
From the equations (A1.3), (A1.4) and (A1.5), we derive a relationship
between the SIR and Eb/No that also involves the processing gain. So after
de-spreading process:
P
o
b
GSIR
N
E
⋅= (A1.6)
In another form:
o
b
P N
E
G
SIR ⋅=
1
(A1.6.1)
Equation (1.6.1), when the quantities are expressed in dBs, becomes:
p
o
b
G
N
E
SIR −= (A1.7)
The following figure summarizes graphically this physical process.
8. A.F. COSME. UMTS CAPACITY SIMULATION STUDY
8
RF input
Rc
W= 5MHz
Spreading
Code
W
f0
Data, Rb
f
0
RF output
W= 5MHz
W
f0
Data, Rb
Rc
Spreading
Code
f
0
EEcc//IIoo ++ GGpp == EEbb//NNoo,, iinn ddBB
Rx
antenna
Tx
antenna
Noise &
interfering
signals
W
f0
EEbb//NNoo
EEcc//IIoo
This is
negative!
oorr SSIIRRttaarrggeett ++ GGpp == EEbb//NNoo iinn ddBB
Figure 1-5: Physical meaning of SIR and Eb/No [Vourekas]
To put a practical example: consider a speech signal with a bit-rate of
12.2kbps. So Rb=12.2 kbps and Rc= 3.84 Mchips/sec. Then the processing
gain of the signal is:
( ) dB
R
R
G
b
c
p 251015.3log10
102.12
1084.3
log10log10 2
3
6
=⋅⋅=⎟⎟
⎠
⎞
⎜⎜
⎝
⎛
⋅
⋅
⋅=⎟⎟
⎠
⎞
⎜⎜
⎝
⎛
⋅=
After despreading, the baseband (own) signal needs to be typically a few
dB above the interference and noise power. This required signal power
density above the noise power density after despreading is designated as
Eb/No. This quantity is of capital importance because the quality targets
are always expressed as a function of Eb/No as can be seen in the
analysis presented in [Castro] where the Bit Error Rate probability is
derived in terms of this figure. As the quality targets are expressed as
function of Eb/No , the CDMA equations regarding capacity also use this
important figure as it is going to be shown in a later section.
The required signal power density below the interference power density
before despreading is designated as SIR (Signal to Interference Ratio),
and it is also known as Ec/Io (In fact, Ec/Io and Ec/No are the same thing.
3GPP just had to use different nomenclature than the IS-95 community).
9. 9 Beneficiario COLFUTURO 2003
For speech service Eb/No is typically in the order of 5dB. That means that
after despreading the resulting baseband signal must be 5dB above noise
in order to be successfully reconstructed at the decoder. Therefore, the
required wideband SIR must 5 dB minus the processing gain. This follows
also from equation A1.7.
SIR“target” = 5dB-25dB = -20dB.
In other words:
dBdBdB
NEGSIR obp
52520
/
=+−⇒
⇒=+
(Gains or ratios that are expressed in dBs can be added and subtracted.
In the dB scale multiplication is translated into addition).
But, what exactly does SIR of –20dB mean? It means that the signal can
be buried far below the interference. In fact for our example the chip
power density signal is 100 times smaller than the noise +interference
level.
co
o
c
o
c
o
c
EN
N
E
N
E
dB
N
E
⋅=⇒=⇒−=⎟⎟
⎠
⎞
⎜⎜
⎝
⎛
⇒−=⎟⎟
⎠
⎞
⎜⎜
⎝
⎛
⋅ 100
10
1
2log20log10 2
Thus the required wideband SIR is so tolerant that the signal can be
buried in interference of a power density that is 100 times larger! Still is
that SIR good enough for the signal to be recovered. Compare this with
the 9 to 18 dBs of SIR required for good voice quality in GSM systems
[Holma].
As we have seen so far, within any given channel bandwidth (chip rate)
we will have a higher processing gain for lower user data bit rates
than for high. With high data rates some robustness of the WCDMA
against interference is clearly compromised.
Summarizing, we have to remember the equation (all quantities in dBs):
SIRtarget + Gp = Eb/No (A1.8)
Expressed in dB the received SIR is negative. It is then multiplied with the
processing gain, an addition in dB scale. If now the processing gain is not
large enough the resulting Eb/No will be too small and will not “rise” above
the interference. In case the Eb/No < 0 there is no detection at all.
10. A.F. COSME. UMTS CAPACITY SIMULATION STUDY
10
This fact gives us the first impression of why the Interference levels in the
network are so important in the radio planning process of UMTS systems,
because if the interference level is high in some cells (because the
interference contribution of many users sharing the air interface and
probably using different data rates), then the Eb/No level of some links is
not going to be enough to make their signal to “rise” above the
interference level and therefore the call would be dropped (i.e. the
capacity in terms of number of supported users per cell is modified) and
the cell-size (coverage) would be reduced (phenomena known as “cell
breathing” effect). This is the main reason why in UMTS capacity and
coverage planning cannot be separated processes, as it can be done
for instance in other mobile systems such as GSM where first predictions
of the path loss are evaluated in order to ensure the coverage of the
desired area, and then capacity is dimensioned as a second step (capacity
in a GSM cell it is given by the number of available channels, which is a
function of the reuse factor and the number of carriers per cell [Umts-
forum6] and therefore the sensitivity level at the base stations (i.e. the
minimum power level of the incoming signal at the receiver in order to be
detected) can be assumed as a constant.
On the contrary, in UMTS the sensitivity of the base stations is a random
variable that depends on the number of users and the bit rates / services
being used at any given time, then it is clear that capacity influences
coverage and a separate planning of capacity and coverage cannot be
performed, as the interference should be taken into account already in the
coverage prediction.
1.6 UMTS Architecture (Rel99)
The following section aims to introduce shortly the network elements and
interfaces of the UMTS architecture (Release 99), including UTRAN and
Core Network. The Core Network however, it is presented here just for the
sake of the architecture completeness but its analysis is out of the scope
of this study.
11. 11 Beneficiario COLFUTURO 2003
Figure 1-6: UMTS Architecture (Rel-99)
UE (User Equipment)
The UE, as defined in [21.905] is the mobile equipment with one or
several UMTS Subscriber Identity Modules (USIMs). Therefore, the UE
consists of two parts, the ME which is the radio terminal itself, and the
USIM which is the “smartcard”, analog to the SIM cards of the GSM
phones but with some advanced extra-features (secure downloading of
applications, possible inclusion of payment methods, etc).
UTRAN (UMTS Radio Access Network)
UTRAN is a logical grouping that includes one or more Radio Network
Subsystem (RNS). Two of them (RNS1, RNS2) are depicted in the figure
4. A RNS is a sub-network within UTRAN and consists of one Radio
Network Controller (RNC) and one or more Node Bs. For simulation
purposes, only one RNS is simulated. In the following section, the main
components of the RNS are explained.
Node B
The Node-B is analog in functionality to the BTS in GSM networks. Its
main function is to provide the radio link between the UE and the UMTS
network. It performs radio functions related to the “air interface”, which is
the logical interface (known as Uu interface in 3GPP specifications)
between the UE and the Node B. Higher layer functions (e.g. Medium
Access Control) and control of the Node Bs is performed by the RNC.
Some of its main tasks are the implementation of Radio Resource
Node B
Node B
....
Uu
(air interface)
Node B
....
RNC
RNC
Iur
Iub
Iub
Iub
Iu-CS
Iu-PS
MSC/V GMSC
CS
Networks
(PSTN,
SGSN GGSN
PS
Networks
(Internet..)
PS-Domain
CS-Domain
HLR
UTRAN CN
...
UE
Simulation
Scope
siguiente páginapágina anterior