SlideShare a Scribd company logo
1 of 107
WCDMATheory
Version1.00
ZTE CORPORATION
ZTE Plaza, Keji Road South,
Hi-Tech IndustrialPark,
Nanshan District, Shenzhen,
P. R. China
518057
Tel: (86) 755 26771900 800-9830-9830
Fax: (86) 755 26772236
URL: http://support.zte.com.cn
E-mail: doc@zte.com.cn
LEGAL INFORMATION
Copyright © 2006 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractualconfidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
The contents of this document and all policies of ZTE CORPORATION, including without limitation policies related to
support or training are subject to change without notice.
Revision History
Date Revision No. Serial No. Reason for Revision
7/30/2009 R1.0 sjzlyyyyxxxx First edition
ZTE CORPORATION
We Values Your Comments & Suggestions!
Your opinion is of great value and will help us improve the quality of our product
documentation and offer better services to our customers.
Please fax to: (86) 755-26772236; or mail to Documentation R&D Department,
ZTE CORPORATION, ZTE Plaza, A Wing, Keji Road South, Hi-Tech Industrial Park,
Shenzhen, P. R. China 518057.
Thank you for your cooperation!
Document
Name
WCDMA Theory
Product Version V1.00
Document Revision
Number
R1.0
Equipment Installation Date
Your evaluation
of this
documentation
Presentation:
(Introductions, Procedures, Illustrations, Completeness, Level of Detail, Organization,
Appearance)
 Good  Fair  Average  Poor  Bad  N/A
Accessibility:
(Contents, Index, Headings, Numbering, Glossary)
 Good  Fair  Average  Poor  Bad  N/A
Intelligibility:
(Language, Vocabulary, Readability & Clarity, Technical Accuracy, Content)
 Good  Fair  Average  Poor  Bad  N/A
Your
suggestions for
improvement of
this
documentation
Please check the suggestions which you feel can improve this documentation:
 Improve the overview/introduction  Make it more concise/brief
 Improve the Contents  Add more step-by-step procedures/tutorials
 Improve the organization  Add more troubleshooting information
 Include more figures  Make it less technical
 Add more examples  Add more/better quick reference aids
 Add more detail  Improve the index
 Other suggestions
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
# Please feel free to write any comments on an attached sheet.
If you wish to be contacted regarding your comments, please complete the following:
Name Company
Postcode Address
Telephone E-mail
This page is intentionally blank.
Contents
About this Manual.........................................................................i
Purpose........................................................................................ i
Intended Audience ....................................................................... i
Prerequisite Skill and Knowledge .................................................. i
What is in This Manual.................................................................. i
Related Documents ......................................................................ii
Conventions .................................................................................ii
How to Get in Touch....................................................................iii
Chapter 1........................................................................................5
Key Technologies.........................................................................5
RAKE Receiver...............................................................5
Power Control................................................................7
Purpose of Power Control in WCDMA............................................7
Power Control Types in WCDMA...................................................8
Open Loop Power Control ............................................................ 8
Close Loop Power Control............................................................ 9
Handover......................................................................9
Mobility.......................................................................................9
Handover Types in WCDMA .......................................................10
Softer Handover........................................................................10
Soft Handover...........................................................................11
Hard Handover..........................................................................12
Handover Procedure..................................................................12
Admission Control ........................................................ 16
Measurement Related to Admission Control ............................... 17
Load Control/Congestion Control..................................... 18
AMR .......................................................................... 19
Chapter 2.....................................................................................21
Interface and Protocol............................................................21
Overview.................................................................... 21
UTRAN Common Protocol Model ................................................ 21
The Radio Interface Protocol Reference Model............................ 24
UTRAN Protocol Reference Model............................................... 25
Access Layer and Non-access Layer........................................... 26
Main Protocol Function .................................................. 26
Medium Access Control (MAC) Protocol...................................... 26
Radio Link Control (RLC) Protocol.............................................. 27
Signalling Transport (SCCP) ...................................................... 27
IP Transport for User Data (GTP-U)........................................... 28
Radio Access Network Application Protocol(RANAP) ................... 28
Radio Network Subsystem Application Protocol(RNSAP)............. 28
Node B Application Protocol(NBAP)............................................ 28
Radio Resource Control (RRC) Protocol...................................... 29
Packet Data Convergence Protocol(PDCP).................................. 30
Broadcast Multicast Control(BMC).............................................. 30
UTRAN Frame Protocols(FP) ...................................................... 30
Chapter 3 ....................................................................................31
Channel Structure and Function..........................................31
Overview.................................................................... 31
Channel Type............................................................................ 31
Channel Mapping ...................................................................... 32
Logical Channel ........................................................... 35
Transport Channel ....................................................... 35
Physical Channel.......................................................... 37
Uplink Physical Channel............................................................. 37
Downlink Physical Channel ........................................................ 42
Physical Layer Procedure ............................................... 52
Cell search procedure................................................................ 52
Random Access Procedure......................................................... 53
Chapter 4 ....................................................................................57
Network Transport...................................................................57
Overview.................................................................... 57
Asynchronous Transfer Mode in UMTS ............................. 58
Basic Configuration of ATM........................................................ 59
ATM Adaptation Layer (AAL)...................................................... 61
AAL2.........................................................................................63
AAL5.........................................................................................64
QoS Classes Under 3GPP ...........................................................65
ATM Service Class .....................................................................66
IP Transport in UMTS.................................................... 67
Chapter 5.....................................................................................71
Procedure Examples................................................................71
Elementary Procedures ................................................. 71
Paging.......................................................................................73
RRC Connection Setup............................................................... 75
Transaction Reasoning............................................................... 77
Authentication and Security Control...........................................78
Transaction Setup with Radio Access Bearer (RAB) Allocation.....79
Transaction...............................................................................81
Transaction Clearing and RAB Release .......................................82
RRC Connection Release............................................................85
Chapter 6.....................................................................................87
WCDMA Evolved........................................................................87
WCDMA Evolved Overview ............................................. 87
HSDPA ....................................................................... 87
The Concept of HSDPA ..............................................................87
Shared channel transmission.....................................................88
Higher-order modulation ...........................................................89
Short transmission time interval (TTI) .......................................90
Fast link adaptation...................................................................90
Fast scheduling .........................................................................91
Fast hybrid automatic-repeat-request (ARQ)..............................92
Figures .........................................................................................95
Tables...........................................................................................99
This page is intentionally blank.
Confidential and Proprietary Information of ZTE CORPORATION i
About this Manual
Purpose
This Manual provides WCDMA theory introduction.
Readers can get an overall understanding of WCDMA.
Intended Audience
This document is intended for engineers and technicians who
perform operation activities on the ZXWR RNS(RNC and Node B
family) equipment.
Prerequisite Skill and Knowledge
To use this document effectively, users should have a general
understanding of wireless telecommunications technology.
Familiarity with the following is helpful:
 Mobile communication knowledge
 Computer operation ability
What is in This Manual
This Manual contains the following chapters:
TAB L E 1 CH APTER SU MMAR Y
Chapter Summary
Chapter 1 Key
Technologies
Introduces the key technologies in
WCDMA, including RAKE receiver, power
control, handover, admission control, load
control/congestion control and AMR.
Chapter 2 Interface and
Protocol
Introduces WCDMA interface and protocol,
including protocol model, main protocol
function.
Chapter 3 Channel Introduces channel types, channel
WCDMA Theory
ii Confidential and Proprietary Information of ZTE CORPORATION
Chapter Summary
Structure and Function mapping, channel frame structure and
function.
Chapter 4 Network
Transport
Introduces ATM and IP transport in
WCDMA network.
Chapter 5 Procedure
Examples
Introduces WCDMA elementary procedure.
Chapter 6 WCDMA
Evolved
Introduces HSDPA technologies mainly.
Figures Provides figure list in this manual.
Tables Provides table list in this manual.
Related Documents
The following document is related to this manual:
 WCDMA Basics
Conventions
ZTE documents employ the following typographical conventions.
TAB L E 2 TYPOGR APH I C AL CON VEN TI ON S
Typeface Meaning
Italics References to other Manuals and documents.
“Quotes” Links on screens.
Bold Menus, menu options, function names, input
fields, radio button names, check boxes, drop-
down lists, dialog box names, window names.
CAPS Keys on the keyboard and buttons on screens
and company name.
Constant width Text that you type, program code, files and
directory names, and function names.
[ ] Optional parameters.
{ } Mandatory parameters.
| Select one of the parameters that are delimited
by it.
Note: Provides additional information about a
certain topic.
Checkpoint: Indicates that a particular step needs
to be checked before proceeding further.
Tip: Indicates a suggestion or hint to make things
easier or more productive for the reader.
Typographical
Conventions
About this Manual
Confidential and Proprietary Information of ZTE CORPORATION iii
TAB L E 3 M OU SE OPER ATI ON CON VEN TI ON S
Typeface Meaning
Click Refers to clicking the primary mouse button (usually
the left mouse button) once.
Double-click Refers to quickly clicking the primary mouse button
(usually the left mouse button) twice.
Right-click Refers to clicking the secondary mouse button
(usually the right mouse button) once.
Drag Refers to pressing and holding a mouse button and
moving the mouse.
How to Get in Touch
The following sections provide information on how to obtain
support for the documentation and the software.
If you have problems, questions, comments, or suggestions
regarding your product, contact us by e-mail at
support@zte.com.cn. You can also call our customer support
center at (86) 755 26771900 and (86) 800-9830-9830.
ZTE welcomes your comments and suggestions on the quality
and usefulness of this document. For further questions,
comments, or suggestions on the documentation, you can
contact us by e-mail at doc@zte.com.cn; or you can fax your
comments and suggestions to (86) 755 26772236. You can also
browse our website at http://support.zte.com.cn, which contains
various interesting subjects like documentation, knowledge
base, forum and service request.
Mouse
Operation
Conventions
Customer
Support
Documentation
Support
WCDMA Theory
iv Confidential and Proprietary Information of ZTE CORPORATION
This page is intentionally blank.
Confidential and Proprietary Information of ZTE CORPORATION 5
C h a p t e r 1
Key Technologies
RAKE Receiver
Since multipath signals contain useful information, CDMA
receivers improve the S/N of the received signals by combining
multipath signals. What a RAKE receiver does is to receive the
various channels of signals from multipath signals through
multiple related detectors, and then combine them. The RAKE
receiver is a classical diversity receiver specially designed for the
CDMA system. Its theoretical basis is that when the propagation
delay exceeds one chip code cycle, multipath signals are actually
seen to be mutually irrelevant.
RAKE reception separates and combines multipath signals.
Different from the IS-95 A, WCDMA has three times of multipath
resolving power. In addition, in a WCDMA system, the pilot
information sent by the user can be used for coherent
combination on the reverse link. The theoretical analysis of
WCDMA shows that if the reverse link uses 8-path RAKE
reception, over 75% signal energies are used. The suppression
of the RAKE reception for multiple access interference depends
on the correlation between the different user characteristic
codes.
Maximal ratio RAKE combining of symbols is shown as Figure 1.
WCDMA Theory
6 Confidential and Proprietary Information of ZTE CORPORATION
FI GU R E 1 M AXI MAL R ATI O “RAKE” C OMB I N I N G OF SYMB OL S
Channel can rotate the signal to any phase and to any
amplitude.
QPSK symbols carry information in phase.
Energy splitted to many finger -> combining.
Maximal ratio combining corrects channel phase rotation and
weights components with channel amplitude estimate.
RAKE diversity receiver is shown as Figure 2.
FI GU R E 2 RAKE DI VER SI TY REC EI VER
A rake receiver is a radio receiver designed to counter the
effects of multipath fading. It does this by using several "sub-
receivers" called fingers, that is, several correlators each
assigned to a different multipath component. Each finger
independently decodes a single multipath component; at a later
stage the contribution of all fingers are combined in order to
make the most use of the different transmission characteristics
of each transmission path.
About this Manual
Confidential and Proprietary Information of ZTE CORPORATION 7
Power Control
Quality Of Service (QOS) that radio cell network provides for
each subscriber mainly depends on signal-to-interference ratio
(SIR) of subscriber receiving signals. For CDMA cell system, all
subscribers in same cell use same band and timeslot, and
subscribers are isolated with each other only by the (quasi-)
orthogonalization of spreading code. Correlation characteristics
between each subscriber signals are not so good and signals of
other subscribers interfere signals of current subscribers, due to
multipath and delay of the radio channels.
Increasing of subscribers or power of other subscribers may
enhance interference on current subscriber. Therefore, CDMA
system is a strong power-restricted system and strength of
interference influences system capacity directly.
Power control is regarded as one of the key technologies of
CDMA system. Power control adjusts transmission power of each
subscriber, compensates channel attenuation, countervails near-
far effect and maintains all subscribers at lowest standard of
normal communication. It reduces interference on other
subscribers at most, increases system capacity and prolongs
holding time of mobile phones.
To achieve acceptable call quality when the TX power is small,
both the BS and the MS are required to adjust power needed by
the transmitter in real time according to the communication
distance and link quality. This process is called "power control".
Purpose of Power Control in
WCDMA
Power control in uplink must make signal powers from different
users nearly equal in order to maximize the total capacity in the
cell.
In downlink the power control must keep the signal at minimal
required level in order to decrease the interference to users in
other cells.
Purpose of power control in WCDMA aims at
 Removes near-far effect.
 Mitigates fading.
 Compensates changes in propagation conditions.
 In the system level
 decrease interference from other users
WCDMA Theory
8 Confidential and Proprietary Information of ZTE CORPORATION
 increase capacity of the system
Power Control Types in WCDMA
Power control of WCDMA includes the fellowing types.
 Open loop power control
Open loop power control is for initial power setting of MS.
Open loop power control is based on the assumption that the
uplink and downlink channels are symmetric. It can
counteract path loss and shadow fade.
 Closed loop power control
 Inner loop power control is used to combat channel fade
and loss, so that the SIR or power of the received signals
can reach the specific target value.
 Outer loop power control generates the SIR or power
threshold for inner power control according to the QoS in
the specific environment. .
Open Loop Power Control
Open loop power control mechanisms attempt to make a rough
estimate of path loss by means of a downlink beacon signal.
Such a method would be far too inaccurate. The prime reason
for this is that the fast fading is essentially uncorrelated between
uplink and downlink, due to the large frequency separation of
the uplink and downlink bands of the WCDMA FDD mode. Open
loop power control is, however, used in WCDMA, but only to
provide a coarse initial power setting of the mobile station at the
beginning of a connection.
FI GU R E 3 OPEN LOOP POW ER CON TR OL
About this Manual
Confidential and Proprietary Information of ZTE CORPORATION 9
Close Loop Power Control
Close loop power control can be divided into inner loop power
control and outer power control.
 Inner loop power control
Inner loop power control is fast closed power control, with
fast speed 1500 times/second, conduting in physical layer
between BS and MS. If SIR measured in physical layer is
lower than target SIR, BS will send increase power
command to MS, and vice versa. Power control command
includes increase power, decrease power and retain power.
Step is 1 dB every time.
 Outer loop power control
Outer power control is slow close loop power control,usually
conduting in one TTI(10ms,20ms,40ms,80ms). Outer power
control is over physical layer, and calculates BLER through
testing CRC correctness or not to determine the value of
target SIR.
 The relationship between inner loop power control and outer
loop power control
The outer loop power control is a kind of slow changing
adjustment between RNC and Node B, while the inner loop
power control is a kind of fast changing adjustment between
NodeB and UE.
Why need both inner loop power control and outer loop
power control? It is hard to get exactly accurate SIR
measurement result during SIR measurement. SIR and
BER(or BLER) is environmental changing and nonlinear. For
instance, in one kind of multipath spreading environment,
BLER 1/100 need SIR 5 dB,while in another kind of multipath
spreading environment same BLER need SIR maybe 5.5 dB.
That means quality of service is directly determined by BLER
not by SIR(SIR only indirectly determined Qos) .
Handover
Mobility
Mobility provides the possibility of being reachable anywhere and
any time for the end-user.
The mobility is provided through:
WCDMA Theory
10 Confidential and Proprietary Information of ZTE CORPORATION
Handover: gurantees that whenever the mobile is moving from
one BS area/cell to another, the signal is handed over to the
target BS.
When there is no continuous active radio link between mobile
and BS, the mobility is supported by:
 Location update: user registers in the network that it can be
found in given area. Mobile always initiates the location
update procedure.
 Paging: indication to the user about the the need for
transaction. Paging procedure is always initiated by the
network.
Handover Types in WCDMA
1. Intra-system handovers
 Intra-frequency handovers
MS handover within one cell between different sectors:
Softer handover
MS handover between different BS:
 Soft handover
 Hard handover
 Inter-frequency handovers
Hard handover
2. Inter-system handovers
 Handover between WCDMA <-- > GSM900/1800: Hard
handover
 Handower between WCDMA/FDD <--> TDD: Hard handover
Softer Handover
Softer handover refers to handover between cells with same
frequency and in same base station, as shown in Figure 4.
About this Manual
Confidential and Proprietary Information of ZTE CORPORATION 11
FI GU R E 4 SOF TER H AN D OVER
While MS in overlapping cell coverage area of two adjacent
sectors of a BS, communication between MS and BS is via two
air interface channels (one for each separate sector). Different
sectors have different scrambling codes.
MS tunes the RAKE fingers to different sectors and combines the
outputs. BS receives signals with different antennas and decodes
and combines them.
Soft Handover
Soft handover refers to adding a new link (the old and the new
links exist at the same time) and deleting the old one after
stabilization. Services continue in the handover, as shown in
Figure 5.
FI GU R E 5 SOF T HAN D OVER
WCDMA Theory
12 Confidential and Proprietary Information of ZTE CORPORATION
MS: At Rake Maximal Ratio Combining of signals from different
BS.
BS: Frame selection. Extra transmission across Iub.
Difference of soft handover and softer handover is that
combination of radio links is realized by RNC for soft handover
while is realized in Node B (decided by RNC) for softer handover.
Hard Handover
Hard handover refers to deleting the old link and then building a
new link. Services break off during the handover, as shown in
Figure 6.
FI GU R E 6 HAR D HAN D OVER
Node B
Node B
Cell 1 Cell 2
Handover Procedure
1. The basic process of handover is shown as Figure 7.
i. Measurement (UE); report on measurement results
(report from UE to RNC)
ii. RNC decides whether to perform handover according to
the report and algorithm (RNC sends the command of
handover to UE if it is necessary).
iii. Handover execution
About this Manual
Confidential and Proprietary Information of ZTE CORPORATION 13
FI GU R E 7 TH E B ASI C PR OC ESS OF H AN D OVER
Figure 8 shows detailed flow of handover.
FI GU R E 8 HAN D OVER FL OW
Active Set: is a set of signal branches (Cells) through which
the MS has simultaneously connection to the UTRAN.
In 3GPP, events correlative to handover are:
 Event correlative to soft handover in the band: 1A ~ 1F
Measured value is usually Ec/N0 of pilot channel, reflecting
the quality of a certain cell. 3GPP defines a series of
WCDMA Theory
14 Confidential and Proprietary Information of ZTE CORPORATION
measurement events in the band. UE reports corresponding
events when meeting definitions.
FI GU R E 9 EVEN T C OR R EL ATI VE TO SOF T H AN D OVER
Event Description
Event 1A
Quality of target cell improves, entering a report range of relatively
activating set quality
Event 1B
Quality of target cell decreases, depart from a report range of
relatively activating set quality
Event 1C
The quality of a non-activated set cell is better than that of a certain
activated set cell
Event 1D Best cell generates change
Event 1E Quality of target cell improves, better than an absolute threshold
Event 1F Quality of target cell decreases, worse than an absolute threshold
 Event correlative to hard handover between bands: 2A ~ 2F
Ec/N0 is measured value, reflecting quality of operators by
measuring cells at different bands. UE reports corresponding
events when meeting definitions.
FI GU R E 10 EVEN T C OR R EL ATI VE TO H AR D H AN D OVER
Event Description
Event 2A Best band generates change
Event 2B
Quality of currently-used band is worse than an absolute threshold
and that of non-used band is better than an absolute threshold
Event 2C Quality of non-used band is better than an absolute threshold
Event 2D Quality of currently-used band is worsethan an absolute threshold
Event 2E Quality of non-used band is worse than an absolute threshold
Event 2F Quality of currently-used band is better than an absolute threshold
 Event correlative to handover between systems: 3A ~ 3D
RSSI is measured value for GSM. UE reports corresponding
events when meeting definitions.
FI GU R E 11 EVEN T C OR R EL ATI VE TO H AN D OVER B ETW EEN SYSTEMS
Event Description
Event 3A
Quality of currently-used UTRAN operator is worse than an
absolute threshold and quality of other radio systems is better than
an absolute threshold
Event 3B Quality of other radio systems is worse than an absolute threshold
Event 3C Quality of other radio systems is better than an absolute threshold
Event 3D Best cell in other systems generates change
For example: Adding a radio link in soft handover and Figure
12 shows signaling process of handover.
About this Manual
Confidential and Proprietary Information of ZTE CORPORATION 15
FI GU R E 12 SOF T HAN D OVER (AD D I N G A LI N K ) SI GN AL I N G FL OW
2. Compression mode
UE has only one RF reception unit and can only decode
signals of one frequency at one time. Therefore, compression
mode is necessary if measuring two cells of different bands
or different cells. Figure 13 shows compression mode
priciple.
WCDMA Theory
16 Confidential and Proprietary Information of ZTE CORPORATION
FI GU R E 13 COMPR ESSI ON M OD E PR I N C I PL E
Dat a Compressi on1 Frame/ 10 ms
1 f rame
Compressed
I dl e t i me f or
het ero-f requency
measurement
1 f rame
uncompressed
In compression mode, Node B compresses data when sending
some downlink channel frames. UE takes advantage of
remaining time for measurement of different bands.
Compression mode can be realized by drilling and halving
spreading factors, and so on. When measuring between
frequencies, the system negotiates with UE whether to support
and select compression mode.
Admission Control
The idea behind admission control strategies is as follows. When
a user originates a call to the network requesting a desired QoS,
the network must do two things before accepting the call
request.
First, it must make sure that it has sufficient bandwidth to
allocate to that user.
Second, it must determine if, after admitting the user, it can
continue to provide the same QoS for all existing connections.
One QoS objective may be a desired packet loss probability.
Thus, before the network admits the new user, it should
determine whether it can meet that packet loss probability goal
for all connections, old as well as new.
Call admission control decides to accept or refuse a new
subscriber, new Radio Access Bearer (RAB) and new Radio Link
(RL) according to current resource (such as, handover). Call
admission control is applicable to original UE access, RAB
designation, reconfiguration and handover. It may lead to
different results because of PRI and actual situations.
About this Manual
Confidential and Proprietary Information of ZTE CORPORATION 17
Call admission control meets QOS of new calls as much as
possible premising the stability of the system, based on
interference measurement, to avoid overloading.
Call admission control falls into:
 Uplink call admission control
 Downlink call admission control
WCDMA is a self-interference system and there exists power
climbing. The core is power. Uplink capacity depends on whether
total receiving interference power is beyond linear dynamic
range of LNA or not. Downlink capacity depends on whether the
distribution of transmission power completes or not.
Process of call admission control:
Measure current load of system cell when making calls (new
access calls and handover calls), and forecast and estimate calls,
then judge whether to access calls. Take QOS requirements of
calls. That is, communication rate, communication quality
(signal-to-noise ratio and error code ratio) and delay into
consideration when forecasting calls. Refuse the call when it
approaches some threshold.
Service calls fall into new calls and handover calls. Reserve some
resources for handover calls to ensure high ratio of successful
handovers. PRI of handover calls is distinguished by admission
control threshold. Admission control threshold of new calls is
lower than that of handover calls. New calls are refused when
current load of the cell is higher than admission threshold of new
calls. However, handover calls are accepted. Handover ratio is
better to be at about 35% in soft handover. Handover calls are
also refused when the load of the cell is higher than handover
admission control threshold. Load control threshold is commonly
higher than admission control threshold of handover, to prevent
overloading when radio circumstances change and to ensure the
stable running of the system.
Measurement Related to Admission
Control
 Node B Common Measurement
 DCH measurement
Major factors to influence WCDMA system capacity (DCH)
are uplink interference and downlink operator emission
power. DCH admission control performs admission
decision on these two parameters. Node B reports RTWP
and TCP of Node B common measurement to RNC
periodically, so that RNC can decide whether to access
the new call according to latest load.
 HS-DSCH measurement
WCDMA Theory
18 Confidential and Proprietary Information of ZTE CORPORATION
HS-DSCH admission control needs Node B common
measurement information related to HSDPA, including
HS-DSCH required power, transmitted operator power of
all codes not used for HS-PDSCH or HS-SCCH
transmission. Therefore, open these common
measurements simultaneously in cells supporting HSDPA.
 RACH measurement
According to policies of ZTE, to estimate the load, RACH
starts up acknowledged PRACH preambles common
measurement during the admission control, to get actual
utilization ratio of PRACH channel.
 UE measurement
When predicting downlink power, RNC needs real-time route
loss of UE. RNC can get route loss of UE by different means
according to admission requests type, such as, reporting
through some events of UE.
Load Control/Congestion
Control
 Process of load control
The system measures the load of the system cell at real time
continually. The system load is high and the load enters
unstable running district of the system when load average
value exceeds some threshold value in a set time. Load
control is necessary at the moment.
 Load control threshold
The core of load control is to access as many services as
possible premising that the system is running stably, to
realize high efficient running. Leave some redundancy,
excluding base line for system breakdown, as threshold value
of load control. Threshold value of load control is larger than
that of admission control.
 Load control mode
Load control works when system load approaches or exceeds
load threshold value. Main modes:
 Reduce the load in a rapid mode, which is mainly realizes
by base station (Node B).
Downlink rapid load control: Refusing the command to
increase the power from the mobile station.
Uplink rapid load control: Reducing SIR destination value
for uplink rapid power control.
 Reduce the load in medium or slow mode, which is
mainly realized by base station controller (RNC).
About this Manual
Confidential and Proprietary Information of ZTE CORPORATION 19
Commonly, RNC makes judgment and changes max
allowed transmission power, destination SIR value and
TFCS by reconfiguring the RL. In this mode, the system
load can be reduced for a long time.
Make negotiations if hoping to reduce the system load for
a long time, that is, RNC negotiates with CN to reduce
resource occupation of services during the
communications. Or, share loads with adjacent cells in
RNS to reduce the load of those overloading cells. The
taking-in and sending-out of adjacent cells (covering
radius of one cell increases and that of another adjacent
cell decreases) is called cell breathing.
Conclusions:
 Reducing the throughput of grouping (reducing the
transmission rate)
 Handing over to other WCDMA carrier frequency
 Handing over to GSM system
 Reducing the rate of real-time services
 Executing the call drops
AMR
Adaptive Multi Rate (AMR) code is a voice-coding plan. It is
called broadband AMR (AMR-WB or AMR Wideband) in WCDMA.
Current GSM speech coding (FR, HR, EFR and AMR) is applicable
to narrowband speech and audio bandwidth is limited to 3.4 kHz.
Audio bandwidth of AMR-RB extends to 7 kHz, which makes the
voice much clearer and natural, especially in hands-free
situations.
AMR provides eight coding rates of 4.7 k, 5,15 k, 5.9 k, 6.7 k,
7.4 k, 7.95 k, 10.2 k and 12.2 k. Select codes with low rate on
condition that it does not influence communication quality, to
save network resource.
21
C h a p t e r 2
Interface and Protocol
Overview
UTRAN Common Protocol Model
Figure 14 shows the general protocol model for UT RAN
Interfaces, and described in detail in the following subclauses.
The structure is based on the principle that the layers and planes
are logically independent of each other. Therefore, as and when
required, the standardisation body can easily alter protocol
stacks and planes to fit future requirements.
FI GU R E 14 UTRAN COMMON PR OTOC OL M OD EL
Application
Protocol
Data
Stream(s)
ALCAP(s)
Transport
Network
Layer
Physical Layer
Signalling
Bearer(s)
Transport
User
Network
Plane
Control Plane User Plane
Transport
User
Network
Plane
Transport Network
Control Plane
Radio
Network
Layer
Signalling
Bearer(s)
Data
Bearer(s)
Horizontal, The Protocol Structure consists of two main layers:
 Radio Network Layer
WCDMA Theory
22 Confidential and Proprietary Information of ZTE CORPORATION
 Transport Network Layer.
All UT RAN related issues are visible only in the Radio Network
Layer, and the Transport Network Layer represents standard
transport technology that is selected to be used for UTRAN, but
without any UTRAN specific requirements.
Vertical, UTRAN falls into the following 4 planes:
 Control Plane
Purpose of the control plane:
Control the radio access bearer and the connection
between UE and the network;
Transmit messages of non-access layer transparently.
The Control Plane includes the application protocol and
the Signaling Bearer for transporting the Application
Protocol messages.
The control plane protocols of each interface on RNL
include:
Interface Iu: RANAP protocol
Interface Iur: RANSAP protocol
Interface Iub: NBAP protocol
Interface :Uu: RRC protocol
Among other things, the Application Protocol is used for
setting up bearers for (i.e. Radio Access Bearer or Radio
Link) in the Radio Network Layer. In the three plane
structure the bearer parameters in the Application
Protocol are not directly tied to the User Plane
technology, but are rather general bearer parameters.
The Signalling Bearer for the Application Protocol may or
may not be of the same type as the Signalling Protocol
for the ALCAP. The Signalling Bearer is always set up by
O&M actions.
 User Plane
Purpose of user plane:
Transmit the user data via the access network.
The User Plane Includes the Data Stream(s) and the Data
Bearer(s) for the Data Stream(s). The Data Stream(s)
is/are characterised by one or more frame protocols
specified for that interface.
 TNL Control Plane
TNL control plane protocol is ALCAP, belonging to SAAL
(Signalling AAL) of ATM.
The Transport Network Control Plane does not include
any Radio Network Layer information, and is completely
in the Transport Layer. It includes the ALCAP protocol(s)
that is/are needed to set up the transport bearers (Data
Chapter 2 Interface and Protocol
23
Bearer) for the User Plane. It also includes the
appropriate Signalling Bearer(s) needed for the ALCAP
protocol(s).
The Transport Network Control Plane is a plane that acts
between the Control Plane and the User Plane. The
introduction of Transport Network Control Plane makes it
possible for the Application Protocol in the Radio Network
Control Plane to be completely independent of the
technology selected for Data Bearer in the User Plane.
When Transport Network Control Plane is used, the
transport bearers for the Data Bearer in the User Plane
are set up in the following fashion. First there is a
signalling transaction by the Application Protocol in the
Control Plane, which triggers the set up of the Data
Bearer by the ALCAP protocol that is specific for the User
Plane technology.
The independence of Control Plane and User Plane
assumes that ALCAP signalling transaction takes place. It
should be noted that ALCAP might not be used for all
types Data Bearers. If there is no ALCAP signalling
transaction, the Transport Network Control Plane is not
needed at all. This is the case when pre-configured Data
Bearers are used.
It should also be noted that the ALCAP protocol(s) in the
Transport Network Control Plane is/are not used for
setting up the Signalling Bearer for the Application
Protocol or for the ALCAP during real time operation.
The Signalling Bearer for the ALCAP may or may not be
of the same type as the Signalling Bearer for the
Application Protocol. The Signalling Bearer for ALCAP is
always set up by O&M actions.
 TNL User Plane
The user plane data and control plane data of all RNL
belong to TNL user plane.
The Data Bearer(s) in the User Plane, and the Signalling
Bearer(s) for Application Protocol, belong also to
Transport Network User Plane. As described in the
previous subclause, the Data Bearers in Transport
Network User Plane are directly controlled by Transport
Network Control Plane during real time operation, but the
control actions required for setting up the Signalling
Bearer(s) for Application Protocol are considered O&M
actions.
WCDMA Theory
24 Confidential and Proprietary Information of ZTE CORPORATION
The Radio Interface Protocol
Reference Model
FI GU R E 15 RAD I O I N TER F AC E PR OTOC OL R EF ER EN C E MOD EL
L1 – radio physical layer
L2 – radio link layer
L3 – radio network layer
 L1:
As shown in Figure 15, the physical layer provides its
services as a set of WCDMA transport channels. This makes
the physical layer responsible for the first multiplexing
function: to map the flows from transport channels to
WCDMA physical channels and vice versa.
 L2:
The radio link layer is another multiplexing layer, one
that makes a major contribution to dynamic sharing of
capacity in the WCDMA radio interface. Instead of the
wide variety of L1 transport channels this layer allows the
upper layer to see only a set of radio bearers, along
which different kinds of traffic can be transmitted over
the radio link.
 The Medium Access Control (MAC) sublayer controls the
use of the transport block capacity by ensuring that
capacity allocation decisions (done at the UTRAN end) are
executed promptly at both ends of the radio interface.
Chapter 2 Interface and Protocol
25
 The Radio Link Control (RLC) sublayer then adds regular
link layer functions onto the logical channels provided by
the MAC sublayer.
 For CS domain data (e.g., transcoded speech) the
convergence function is null, but for the PS domain an
additional convergence sublayer is needed. This Packet
Data Convergence Protocol (PDCP) sublayer makes the
UMTS radio interface applicable to carry Internet Protocol
(IP) data packets.
 BMC has been specified for message broadcast and
multicast domains. The scheduling and delivery of cell
broadcast messages to User Equipment (UEs) is the main
task of this protocol.
 L3:
The L3 control plane protocol is the Radio Resource Control
(RRC) protocol. As shown in Figure 15, an RRC protocol
entity at both the UE and UTRAN ends has control interfaces
with all other protocol entities.
UTRAN Protocol Reference Model
WCDMA Theory
26 Confidential and Proprietary Information of ZTE CORPORATION
Access Layer and Non-access Layer
The concepts of access layer and non-access layer are related to
the communication of UE and CN. The access layer bears the
upper layer services via the SAP (Service Access Point), as
shown in Figure 16.
FI GU R E 16 AC C ESS LAYER AN D NON -AC C ESS LAYER
UTRANUE CN
Access Stratum
Non-Access Stratum
Radio
(Uu)
Iu
Radio
proto-
cols
(1)
Radio
proto-
cols
(1)
Iu
proto
cols
(2)
Iu
proto
cols
(2)
The UTRAN AP and frame protocols together form the UMTS
access stratum, which covers all those communication aspects
that are dependent on the selected radio access technology.
Within generic UMTS radio access bearers, non-access stratum
protocols are then used for direct transfer of signalling and
transparent flow of user data frames between UEs and the CN.
This is achieved by encapsulation of the higher layer payload
into UTRAN protocol messages.
Main Protocol Function
Medium Access Control (MAC)
Protocol
The Medium Access Control Protocol performs the following
functions:
 Mapping between logical channels and transport channels.
 Selection of appropriate Transport Format for each
Transport Channel depending on instantaneous source
rate.
 Priority handling between data flows of one UE.
Chapter 2 Interface and Protocol
27
 Priority handling between UEs by means of dynamic
scheduling.
 Identification of UEs on common transport channels.
 Multiplexing/demultiplexing of upper layer PDUs
into/from transport block sets delivered to/from the
physical layer on dedicated transport channels.
 Traffic volume measurement.
 Transport Channel type switching.
 Ciphering for transparent mode RLC.
 Access Service Class selection for RACH and CPCH
transmission.
The complete specification of the MAC protocol is given in 3GPP
specification TS25.321.
Radio Link Control (RLC) Protocol
The Radio Link Control Protocol performs the following functions:
 Segmentation and reassembly.
 Concatenation.
 Padding.
 Transfer of user data.
 Error correction.
 In-sequence delivery of upper layer PDUs.
 Duplicate detection.
 Flow control.
 Sequence number check.
 Protocol error detection and recovery.
 Ciphering.
 SDU discard.
The complete specification of the RLC protocol is given in 3GPP
specification TS25.322.
Signalling Transport (SCCP)
SCCP is derived from SS7 and provides both a connectionless
and connection-oriented service. The connection-oriented
service is used to support signaling bearers.
WCDMA Theory
28 Confidential and Proprietary Information of ZTE CORPORATION
IP Transport for User Data (GTP-U)
The main functions of GTP-U are:
 Data packet transfer.
 Encapsulation and tunnelling.
 Data packet sequencing.
 Path alive check.
GTP-U is defined in 3GPP specification TS 29.060.
Radio Access Network Application
Protocol(RANAP)
RANAP is the protocol that controls resources in the Iu interface.
One RANAP entity resides in the RNC and another peer entity
resides in the MSC server or the SGSN.
The detailed specification for RANAP is given by 3GPP
specification TS 25.413.
Radio Network Subsystem
Application Protocol(RNSAP)
RNSAP is responsible for bearer management signalling across
the Iur interface.
RNSAP is used for setting up radio links and allowing the SRNC
to control these
radio links using dedicated resources in a DRNC.
The complete specification of RNSAP is given in 3GPP
specification TS 25.423.
Node B Application Protocol(NBAP)
NBAP is a radio network layer protocol that maintains control-
plane signaling across the Iub interface and, thus, controls
resources in the Iub interface and provides a means for the BS
and RNC to communicate.
The complete specification of NBAP is given in 3GPP specification
TS 25.433.
Chapter 2 Interface and Protocol
29
Radio Resource Control (RRC)
Protocol
The RRC protocol is the key radio resource control protocol
within the UTRAN.
The major function of the RRC protocol is to control the radio
bearers, transport channels and physical channels. This is done
by set-up, reconfiguration and release of different kinds of radio
bearers.
The Radio Resource Control Protocol performs the following
functions:
 Cell Broadcast Service (CBS) control.
 Initial cell selection and cell re-selection.
 Paging.
 Broadcast of information:
– related to the non-access stratum (Core Network).
– related to the access stratum.
 Establishment, maintenance and release
– of an RRC connection between the UE and UTRAN.
– of Radio Bearers.
 Assignment, reconfiguration and release of radio
resources for the RRC connection.
 Control of requested QoS.
 UE measurement reporting and control of the reporting.
 RRC message integrity protection.
 Arbitration of radio resources on uplink DCH.
 Slow Dynamic Channel Allocation (DCA) (TDD mode).
 Timing advance (TDD mode).
 RRC connection mobility functions (RNC relocation).
 Outer loop power control.
 Control of ciphering.
The RRC protocol is specified in 3GPP specification TS 25.331.
WCDMA Theory
30 Confidential and Proprietary Information of ZTE CORPORATION
Packet Data Convergence
Protocol(PDCP)
As its name suggests PDCP is designed to make WCDMA radio
protocols suitable for carrying the most common user-to-user
packet data protocol, TCP/IP.
The Packet Data Convergence Protocol performs the following
functions:
 Header compression and decompression of IP data
streams (e.g., TCP/IP and RTP/UDP/IP headers for IPv4
and IPv6) at the transmitting and receiving entity,
respectively.
 Transfer of user data. This function is used for
conveyance of data between users of PDCP services.
 Maintenance of PDCP sequence numbers for radio bearers
that are configured to support lossless SRNS Relocation.
The complete specification of PDCP is given in 3GPP specification
TS 25.323.
Broadcast Multicast Control(BMC)
The Broadcast Multicast Control Protocol performs the following
functions:
 Storage of Cell Broadcast Messages.
 Traffic volume monitoring and radio resource request for
CBS.
 Scheduling of BMC messages.
 Transmission of BMC messages to UE.
 Delivery of Cell Broadcast messages to upper layer.
UTRAN Frame Protocols(FP)
UTRAN frame protocols are radio network layer user-plane
protocols that carry UMTS user data over the common UT RAN
transport network. They are active across the UTRAN interfaces
Iu, Iur and Iub. The transport network service used by frame
protocols is based on either ATM or the IP protocol stack.
31
C h a p t e r 3
ChannelStructure and
Function
Overview
Channel Type
Three separate channels concepts in the UT RA N: logical,
transport, and physical channels.
 Logical channels define what type of data is transferred. It
can be divided into two large types:
 Control channel
 Service channel.
 Transport channels define how and with which type of
characteristics the data is transferred by the physical layer.
A general classification of transport channels is into two
types:
 Dedicated channel: used by dedicated user.
 Common channel: used by all users within one cell.
 Physical data define the exact physical characteristics of the
radio channel. In WCDMA, each radio frame of the physical
channel has a length of 10 ms, and there are 15 timeslots.
Each timeslot has a length of Tslot = 2560 chips,
corresponding to one power control cycle. In other words,
one power control cycle is 10/15 ms.
WCDMA Theory
32 Confidential and Proprietary Information of ZTE CORPORATION
FI GU R E 17 CHA NNEL TY P ES IN UTRAN
The three types of channels correspond to the egresses of
different layers of the protocol stack. The logical channel is
between the MAC and RLC, the transport channel is between the
MAC and layer 1, and the physical channel is below layer 1.
Channel Mapping
Channel mapping is shown as Figure 18 and Figure 19.
FI GU R E 18 UPL I N K M APPI N G
Chapter 3 Channel Structure and Function
33
FI GU R E 19 DOW N L I N K M APPI N G
The transport channel to physical channel mapping is illustrated
in Table 4.
TAB L E 4 TR AN SPOR T C H AN N EL TO PH YSI C AL C H AN N EL MAPPI N G
Transport Channel Physical Channel
(UL/DL) Dedicated CHannel
DCH
Dedicated Physical Data CHannel
DPDCH
Dedicated Physical Control CHannel
DPCCH
(UL) Random Access CHannel
RACH
Physical Random Access CHannel
PRACH
(UL) Common Packet CHannel
CPCH
Physical Common Packet CHannel
PCPCH
(DL) Broadcast CHannel BCH
Primary Common Control Physical
CHannel P-CCPCH
(DL) Forward Access CHannel
FACH
Secondary Common Control
Physical Channel S-CCPCH
(DL) Downlink Shared CHannel
DSCH
Physical Downlink Shared CHannel
PDSCH
No mapping transport channels
for these signaling physical
channels
Synchronisation CHannel SCH
Common PIlot CHannel CPICH
Acquisition Indication CHannel
AICH
Paging Indication CHannel PICH
CPCH Status Indication CHannel
CSICH
WCDMA Theory
34 Confidential and Proprietary Information of ZTE CORPORATION
Transport Channel Physical Channel
Collision Detection/Channel
Assignment Indicator CHannel
CD/CA-ICH
A dedicated channel (DCH) is mapped onto two physical
channels. The Dedicated Physical Data Channel (DPDCH) carries
higher layer information, including user data, while the
Dedicated Physical Control Channel (DPCCH) carries the
necessary physical layer control information. These two
dedicated physical channels are needed to support efficiently the
variable bit rate in the physical layer. The bit rate of the DPCCH
is constant, while the bit rate of DPDCH can change from frame
to frame.
Transport channels contain the data generated at the higher
layers, which is carried over the air and are mapped in the
physical layer to different physical channels.
The data is sent by transport block from MAC layer to physical
layer and generated by MAC layer every 10 ms.
The transport format of each transport channel is identified by
the Transport Format Indicator (TFI), which is used in the
interlayer communication between the MAC layer and physical
layer.
Several transport channels can be multiplexed together by
physical layer to form a single Coded Composite Transport
Channel(CCTrCh).
The physical layer combines several TFI information into the
Transport Format Combination Indicator (TFCI), which indicate
which transport channels are active for the current frame.
Two types of transport channels: dedicated channels and
common channels.
 Dedicated channel –reserved for a single user only.
Support fast power control and soft handover.
 Common channel – can be used by any user at any time.
Don’t support soft handover but some support fast power
control.
Note:
There exist physical channels to carry only information relevant
to physical layer procedures. That means in addition to the
physical channels mapped from the transport channels, there
exist physical channels for signaling purposes to carry only
information between network and the terminals. The
Synchronisation Channel(SCH), the Common Pilot Channel
(CPICH) and the Acquisition Indication Channel (AICH)are not
directly visible to higher layers and are mandatory from the
system function point ofview, to be transmitted from every base
station. The CPCH Status Indication Channel(CSICH) and the
Chapter 3 Channel Structure and Function
35
Collision Detection/Channel Assignment Indication Channel
(CD/CA-ICH) are needed if CPCH is used.
Logical Channel
Logical channels are divided into control channel and traffic
channel.
FI GU R E 20 LOGI C AL C H AN N EL
Control channels only used to transport control plane
information, including BCCH,PCCH,CCCH,DCCH,SHCCH.
Traffic channels only used to transport user plane information.
Including DTCH,CTCH.
Transport Channel
Transport channels are services offered by Layer 1 to the higher
layers. A transport channel is defined by how and with what
characteristics data is transferred over the air interface. A
general classification of transport channels is into two groups:
 Dedicated channel: used by dedicated user.
 Common channel: used by all users within one cell.
WCDMA Theory
36 Confidential and Proprietary Information of ZTE CORPORATION
FI GU R E 21 TR AN SPOR T C H AN N EL
BCH
PCH
FACH
DSCH
RACH
CPCH
DCH
DCH
There exists only one type of dedicated transport channel, the
Dedicated Channel (DCH). The Dedicated Channel (DCH) is a
downlink or uplink transport channel. The DCH is transmitted
over the entire cell or over only a part of the cell using e.g.
beam-forming antennas.
There are six types of common transport channels: BCH, FACH,
PCH, RACH, CPCH and DSCH.
 Broadcast Channel -BCH
The Broadcast Channel (BCH) is a downlink transport
channel that is used to broadcast system- and cell-specific
information. The BCH is always transmitted over the entire
cell and has a single transport format.
 Forward Access Channel -FACH
The Forward Access Channel (FACH) is a downlink transport
channel. The FACH is transmitted over the entire cell. It is
used to transmit control information after base station has
received the random access requirement sent by UE. FACH is
also can be used to send packet data.
There is one or several FACH within one cell. One of them
must has low data rate, so all terminals in this cell can
receive it. The others can have high data rate.
 Paging Channel - PCH
The Paging Channel (PCH) is a downlink transport channel.
The PCH is always transmitted over the entire cell. The
transmission of the PCH is associated with the transmission
of physical-layer generated Paging Indicators, to support
efficient sleep-mode procedures.
 Random Access Channel - RACH
The Random Access Channel (RACH) is an uplink transport
channel. The RACH is always received from the entire cell. It
is used to carry control information (such as call setup
Chapter 3 Channel Structure and Function
37
request) sent by UE. The RACH is characterized by a collision
risk and by being transmitted using open loop power control.
 Common Packet Channel - CPCH
The Common Packet Channel (CPCH) is an uplink transport
channel. CPCH is associated with a dedicated channel on the
downlink which provides power control and CPCH Control
Commands (e.g. Emergency Stop) for the uplink CPCH. The
CPCH is characterized by initial collision risk and by being
transmitted using inner loop power control.
 Downlink Shared Channel - DSCH
The Downlink Shared Channel (DSCH) is a downlink
transport channel shared by several UEs. The DSCH is
associated with one or several downlink DCH. The DSCH is
transmitted over the entire cell or over only a part of the cell
using e.g. beam-forming antennas.
Physical Channel
Physical channels are defined by a specific carrier frequency,
scrambling code, channelization code (optional), time start &
stop (giving a duration) and, on the uplink, relative phase (0 or
/2). There are two types of physical channel:
 Uplink physical channel
 Downlink physical channel
Uplink Physical Channel
There are two types of uplink dedicated physical channels(Uplink
Dedicated Physical Data Channel and Uplink Dedicated Physical
Control Channel) and two types of uplink common physical
channels(Physical Random Access Channel and Physical
Common Packet Channel) as shown in Figure 22.
WCDMA Theory
38 Confidential and Proprietary Information of ZTE CORPORATION
FI GU R E 22 U PL I N K PH YSI C AL C H AN N EL
Uplink Dedicated Physical Channel(DPCCH
DPDCH)
There are two types of uplink dedicated physical channels,
the uplink Dedicated Physical Data Channel (uplink DPDCH)
and the uplink Dedicated Physical Control Channel (uplink
DPCCH).The DPDCH and the DPCCH are I/Q code multiplexed
within each radio frame.
The uplink DPDCH is used to carry the DCH transport
channel. There may be zero, one, or several uplink DPDCHs
on each radio link.
The uplink DPCCH is used to carry control information
generated at Layer 1. The Layer 1 control information
consists of known pilot bits to support channel estimation for
coherent detection, transmit power-control (TPC) commands,
feedback information (FBI), and an optional transport-format
combination indicator (TFCI). The transport-format
combination indicator informs the receiver about the
instantaneous transport format combination of the transport
channels mapped to the simultaneously transmitted uplink
DPDCH radio frame. There is one and only one uplink DPCCH
on each radio link.
Figure 23 shows the frame structure of the uplink dedicated
physical channels. Each radio frame of length 10 ms is split
into 15 slots, each of length Tslot = 2560 chips, corresponding
to one power-control period.
Chapter 3 Channel Structure and Function
39
FI GU R E 23 F R AME STR U C TU R E OF U PL I N K D ED I C ATED PH YSI C AL C H AN N EL
The parameter k in figure determines the number of bits per
uplink DPDCH slot. It is related to the spreading factor SF of the
DPDCH as SF = 256/2k. The DPDCH spreading factor may range
from 256 down to 4. The spreading factor of the uplink DPCCH is
always equal to 256, i.e. there are 10 bits per uplink DPCCH
slot.
The exact number of bits of the uplink DPDCH and the different
uplink DPCCH fields (Npilot, NTFCI, NFBI, and NTPC) is configured by
higher layers and can also be reconfigured by higher layers.
The FBI bits are used to support techniques requiring feedback
from the UE to the UTRAN Access Point, including closed loop
mode transmit diversity and site selection diversity transmission
(SSDT).
There are two types of uplink dedicated physical channels; those
that include TFCI (e.g. for several simultaneous services) and
those that do not include TFCI (e.g. for fixed-rate services). It is
the UTRAN that determines if a TFCI should be transmitted and
it is mandatory for all UEs to support the use of TFCI in the
uplink.
Npilot =3, 4, 5, 6, 7 and 8. The shadowed column part of pilot bit
pattern is defined as FSW and FSWs can be used to confirm
frame synchronization. (The value of the pilot bit pattern other
than FSWs shall be "1".)
TPC is corresponding to power contrl command.
Multi-code operation is possible for the uplink dedicated physical
channels. When multi-code transmission is used, several parallel
DPDCH are transmitted using different channelization codes.
However, there is only one DPCCH per radio link.
WCDMA Theory
40 Confidential and Proprietary Information of ZTE CORPORATION
Physical Random Access Channel (PRACH)
The random-access transmission is based on a Slotted
ALOHA approach with fast acquisition indication. The UE
can start the random-access transmission at the
beginning of a number of well-defined time intervals,
denoted access slots. There are 15 access slots per two
frames and they are spaced 5120 chips apart Information
on what access slots are available for random-access
transmission is given by higher layers. The random-
access transmission consists of one or several preambles
of length 4096 chips and a message of length 10 ms or
20 ms.
FI GU R E 24 F R AME STR U C TU R E OF R AN D OM AC C ESS C H AN N EL
Pilot
Npilot bits
Data
Ndata bits
Slot #0 Slot #1 Slot #i Slot #14
Tslot = 2560 chips, 10*2k
bits (k=0..3)
Message part radio frame TRACH = 10 ms
Data
Control
TFCI
NTFCI bits
Each preamble is of length 4096 chips and consists of
256 repetitions of a signature of length 16 chips. There
are a maximum of 16 available signatures.
The 10 ms message part radio frame is split into 15 slots,
each of length Tslot = 2560 chips. Each slot consists of two
parts, a data part to which the RACH transport channel is
mapped and a control part that carries Layer 1 control
information. The data and control parts are transmitted in
parallel.
A 10 ms message part consists of one message part radio
frame, while a 20 ms message part consists of two
Chapter 3 Channel Structure and Function
41
consecutive 10 ms message part radio frames. The
message part length is equal to the Transmission Time
Interval of the RACH Transport channel in use. This TTI
length is configured by higher layers.
The data part consists of 10*2k bits, where k=0,1,2,3.
This corresponds to a spreading factor of 256, 128, 64,
and 32 respectively for the message data part.
The control part consists of 8 known pilot bits to support
channel estimation for coherent detection and 2 TFCI
bits. This corresponds to a spreading factor of 256 for the
message control part. The pilot bit pattern is described in
table 8. The total number of TFCI bits in the random-
access message is 15*2 = 30. The TFCI of a radio frame
indicates the transport format of the RACH transport
channel mapped to the simultaneously transmitted
message part radio frame. In case of a 20 ms PRACH
message part, the TFCI is repeated in the second radio
frame.
Physical Common Packet Channel(PCPCH)
The Physical Common Packet Channel (PCPCH) is used to
carry the CPCH CPCH. The CPCH transmission is based on
DSMA-CD approach with fast acquisition indication. The
UE can start transmission at the beginning of a number of
well-defined time-intervals, relative to the frame
boundary of the received BCH of the current cell.
The PCPCH access transmission consists of one or several
Access Preambles [A-P] of length 4096 chips, one
Collision Detection Preamble (CD-P) of length 4096 chips,
a DPCCH Power Control Preamble (PC-P) which is either 0
slots or 8 slots in length, and a message of variable
length Nx10 ms.
FI GU R E 25 F R AME STR U C TU R E OF CPCH
WCDMA Theory
42 Confidential and Proprietary Information of ZTE CORPORATION
Pilot
Npilot bits
TPC
NTPC bits
Data
Ndata bits
Slot #0 Slot #1 Slot #i Slot #14
Tslot = 2560 chips, 10*2k
bits (k=0..6)
1 radio frame: Tf = 10 ms
Data
Control
FBI
NFBI bits
TFCI
NTFCI bits
 CPCH access preamble part:
Similar to RACH preamble part. The RACH preamble
signature sequences are used. The number of sequences
used could be less than the ones used in the RACH
preamble. The scrambling code could either be chosen to
be a different code segment of the Gold code used to
form the scrambling code of the RACH preambles or could
be the same scrambling code in case the signature set is
shared.
 CPCH collision detection preamble part:
Similar to RACH preamble part. The RACH preamble
signature sequences are used. The scrambling code is
chosen to be a different code segment of the Gold code
used to form the scrambling code for the RACH and CPCH
preambles
 CPCH power control preamble part:
The power control preamble segment is called the CPCH
Power Control Preamble (PC-P) part. The Power Control
Preamble length is a higher layer parameter, Lpc-preamble,
which shall take the value 0 or 8 slots. The TFCI field is
filled with "1" bits.
 CPCH message part:
Similar to uplink dedicated channel, Each 10 ms frame is
split into 15 slots, each of length Tslot = 2560 chips. Each
slot consists of two parts, a data part that carries higher
layer information and a control part that carries Layer 1
control information. The data and control parts are
transmitted in parallel. The sf of CPCH message part is
256.
Downlink Physical Channel
Downlink physical channels include Dedicated physical channel 
one Shared Physical Channel five Common Control Channel:
Chapter 3 Channel Structure and Function
43
 Downlink Detedicated physical channel -DPCH
 Primary and secondary Commnon Pilot Channel - CPICH
 primary and secondary Common Control Physicl Channel
- CCPCH
 Synchronous Channel - SCH
 Physical Downlink Shared Channel - DSCH
 Acquisition Indication Channel - AICH
 Paging Indication Channel - PICH
Downlink physical channel is shown as Figure 26.
FI GU R E 26 D OW N L I N K PH YSI C AL C H AN N EL
Downlink Dedicated Physical Channel(DPCH)
There is only one type of downlink dedicated physical
channel, the Downlink Dedicated Physical Channel (downlink
DPCH).
Within one downlink DPCH, dedicated data generated at
Layer 2 and above, i.e. the dedicated transport channel
(DCH), is transmitted in time- multiplex with control
information generated at Layer 1 (known pilot bits, TPC
commands, and an optional TFCI). The downlink DPCH can
thus be seen as a time multiplex of a downlink DPDCH and a
downlink DPCCH.
Each frame of length 10 ms is split into 15 slots, each of
length Tslot = 2560 chips, corresponding to one power-control
period.
WCDMA Theory
44 Confidential and Proprietary Information of ZTE CORPORATION
FI GU R E 27 F R AME STR U C TU R E OF DL DPCH
The parameter k in Figure 27 determines the total number of
bits per downlink DPCH slot. It is related to the spreading
factor SF of the physical channel as SF = 512/2k. The
spreading factor may thus range from 512 down to 4.
The exact number of bits of the different downlink DPCH
fields (Npilot, NTPC, NTFCI, Ndata1 and Ndata2) is given in table 11.
What slot format to use is configured by higher layers and
can also be reconfigured by higher layers.
There are basically two types of downlink Dedicated Physical
Channels; those that include TFCI (e.g. for several
simultaneous services) and those that do not include TFCI
(e.g. for fixed-rate services). It is the UTRAN that determines
if a TFCI should be transmitted and it is mandatory for all
UEs to support the use of TFCI in the downlink.
Npilot=2,4,8 & 16。
TPC symbol is corresponding to transmission power control
command T “0” or “1”.
Synchronisation Channel(SCH)
The Synchronisation Channel (SCH) is a downlink signal used for
cell search.
The SCH consists of two sub channels, the Primary and
Secondary SCH. The 10 ms radio frames of the Primary and
Secondary SCH are divided into 15 slots, each of length 2560
chips. The frame structure of the SCH is shown in Figure 28.
Chapter 3 Channel Structure and Function
45
FI GU R E 28 FR AME STR U C TU R E OF SCH
Primary
SCH
Secondary
SCH
256 chips
2560 chips
One 10 ms SCH radio frame
acs
i,0
acp
acs
i,1
acp
acs
i,14
acp
Slot #0 Slot #1 Slot #14
The Primary SCH consists of a modulated code of length 256
chips, the Primary Synchronisation Code (PSC) denoted cp in
figure , transmitted once every slot. The PSC is the same for
every cell in the system.
The Secondary SCH consists of repeatedly transmitting a length
15 sequence of modulated codes of length 256 chips, the
Secondary Synchronisation Codes (SSC), transmitted in parallel
with the Primary SCH. The SSC is denoted cs
i,k in figure , where i
= 0, 1, …, 63 is the number of the scrambling code group, and k
= 0, 1, …, 14 is the slot number. Each SSC is chosen from a set
of 16 different codes of length 256. This sequence on the
Secondary SCH indicates which of the code groups the cell's
downlink scrambling code belongs to.
Common Pilot Channel (CPICH)
The CPICH is a fixed rate (30 kbps, SF=256) downlink physical
channel that carries a pre-defined bit sequence.
The frame structure of CPICH is shown in Figure 29.
FI GU R E 29 F R AME STR U C TU R E OF CPICH
Pre-defined bit sequence
Slot #0 Slot #1 Slot #i Slot #14
Tslot = 2560 chips , 20 bits
1 radio frame: Tf = 10 ms
There are two types of Common pilot channels, the Primary and
Secondary CPICH. They differ in their use and the limitations
placed on their physical features.
 Primary CPICH
WCDMA Theory
46 Confidential and Proprietary Information of ZTE CORPORATION
 An important area for the primary common pilot channel
is the measurements for the handover and cell
selection/reselection. The use of CPICH reception level at
the terminal for handover measurements has the
consequence that, by adjusting the CPICH power level,
the cell load can be balanced between different cells.
Reducing the CPICH power causes part of the terminals
to hand over to other cells, while increasing it invites
more terminals to hand over to the cell, as well as to
make their initial access to the network in that cell.
 The Primary Common Pilot Channel (P-CPICH) has the
following characteristics:
i. The same channelization code is always used for the P-
CPICH.
ii. The P-CPICH is scrambled by the primary scrambling
code.
iii. There is one and only one P-CPICH per cell.
iv. The P-CPICH is broadcast over the entire cell.
 The Primary CPICH is a phase reference for the following
downlink channels: SCH, Primary CCPCH, AICH, PICH AP-
AICH, CD/CA-ICH, CSICH, DL-DPCCH for CPCH and the
S-CCPCH. By default, the Primary CPICH is also a phase
reference for downlink DPCH and any associated PDSCH.
The UE is informed by higher layer signaling if the P-
CPICH is not a phase reference for a downlink DPCH and
any associated PDSCH. The Primary CPICH is always a
phase reference for a downlink physical channel using
closed loop TX diversity.
 Secondary CPICH may be phase reference for the secondary
CCPCH.
 A Secondary Common Pilot Channel (S-CPICH) has the
following characteristics:
i. An arbitrary channelization code of SF=256 is used for
the S-CPICH.
ii. A S-CPICH is scrambled by either the primary or a
secondary scrambling code.
iii. There may be zero, one, or several S-CPICH per cell.
iv. A S-CPICH may be transmitted over the entire cell or only
over a part of the cell.
A Secondary CPICH may be a phase reference for a
downlink DPCH. If this is the case, the UE is informed
about this by higher-layer signaling. The Secondary
CPICH can be a phase reference for a downlink physical
channel using open loop TX diversity, instead of the
Primary CPICH being a phase reference.
Chapter 3 Channel Structure and Function
47
Paging Indication Channel (PICH)
The Paging Indicator Channel (PICH) is a fixed rate (SF=256)
physical channel used to carry the paging indicators. The
PICH is always associated with an S-CCPCH to which a PCH
transport channel is mapped.
Figure 24 illustrates the frame structure of the PICH. One
PICH radio frame of length 10 ms consists of 300 bits (b0, b1,
…, b299). Of these, 288 bits (b0, b1, …, b287) are used to carry
paging indicators. The remaining 12 bits are not formally
part of the PICH and shall not be transmitted (DTX). The part
of the frame with no transmission is reserved for possible
future use.
FI GU R E 30 FR AME STR U C TU R E OF PICH
b1b0
288 bits for paging indication
12 bits (transmission
off)
One radio frame (10 ms)
b287 b288 b299
In each PICH frame, Np paging indicators {P0, …, PNp-1} are
transmitted, where Np=18, 36, 72, or 144.
The PI calculated by higher layers for use for a certain UE, is
associated to the paging indicator Pq, where q is computed as
a function of the PI computed by higher layers, the SFN of
the P-CCPCH radio frame during which the start of the PICH
radio frame occurs, and the number of paging indicators per
frame
(Np):
         Np
Np
SFNSFNSFNSFNPIq mod
144
144mod512/64/8/18 










Further, the PI calculated by higher layers is associated with
the value of the paging indicator Pq. If a paging indicator in a
certain frame is set to "1" it is an indication that UEs
associated with this paging indicator and PI should read the
corresponding frame of the associated S-CCPCH.
The PI bitmap in the PCH data frames over Iub contains
indication values for all higher layer PI values possible. Each
bit in the bitmap indicates if the paging indicator associated
with that particular PI shall be set to 0 or 1. Hence, the
calculation in the formula above is to be performed in Node B
to make the association between PI and Pq..The mapping
from {P0, …, PNp-1} to the PICH bits {b0, …, b287} are
according to Table 5.
WCDMA Theory
48 Confidential and Proprietary Information of ZTE CORPORATION
TAB L E 5 M APPI N G OF PAGI N G I N D I C ATOR S PQ TO PICH B I TS
Number of paging
indicators per frame (Np)
Pq = 1 Pq = 0
Np=18
{b16q, …, b16q+15} = {1,
1,…, 1}
{b16q, …, b16q+15} = {0,
0,…, 0}
Np=36
{b8q, …, b8q+7} = {1, 1,…,
1}
{b8q, …, b8q+7} = {0, 0,…,
0}
Np=72
{b4q, …, b4q+3} = {1, 1,…,
1}
{b4q, …, b4q+3} = {0, 0,…,
0}
Np=144 {b2q, b2q+1} = {1, 1} {b2q, b2q+1} = {0, 0}
Acqusition Indication Channel(AICH)
The Acquisition Indicator channel (AICH) is a fixed rate
(SF=256) physical channel used to carry Acquisition
Indicators (AI). Acquisition Indicator AIs corresponds to
signature s on the PRACH.
Figure illustrates the structure of the AICH. The AICH
consists of a repeated sequence of 15 consecutive access
slots (AS), each of length 5120 chips. Each access slot
consists of two parts, an Acquisition-Indicator (AI) part
consisting of 32 real-valued symbols a0, …, a31 and a part
of duration 1024 chips with no transmission that is not
formally part of the AICH. The part of the slot with no
transmission is reserved for possible use by CSICH or
possible future use by other physical channels.
The spreading factor (SF) used for channelisation of the
AICH is 256.
The phase reference for the AICH is the Primary CPICH.
FI GU R E 31 FR AME STR U C TU R E OF AICH
1024 chips
Transmission Off
AS #14 AS #0 AS #1 AS #i AS #14 AS #0
a1 a2a0 a31a30
AI part = 4096 chips, 32 real-valued symbols
20 ms
Chapter 3 Channel Structure and Function
49
CPCH Access Preamble Acqusition Indication
Channel (AP-AICH)
The Access Preamble Acquisition Indicator channel (AP-AICH)
is a fixed rate (SF=256) physical channel used to carry AP
acquisition indicators (API) of CPCH. AP acquisition indicator
APIs corresponds to AP signature s transmitted by UE.
AP-AICH and AICH may use the same or different
channelisation codes. The phase reference for the AP-AICH is
the Primary CPICH. Frame structure of AP-AICH is shown as
Figure 32.
FI GU R E 32 FR AME STR U C TU R E OF AP-AICH
1024 chips
Transmission Off
AS #14 AS #0 AS #1 AS #i AS #14 AS #0
a1 a2a0 a31a30
API part = 4096 chips, 32 real-valued symbols
20 ms
The AP-AICH has a part of duration 4096 chips where the AP
acquisition indicator (API) is transmitted, followed by a part
of duration 1024chips with no transmission that is not
formally part of the AP-AICH. The part of the slot with no
transmission is reserved for possible use by CSICH or
possible future use by other physical channels.
CPCH Collision Detection/Channel Assignment
Indicator Channel (CD/CA -ICH)
The Collision Detection Channel Assignment Indicator
channel (CD/CA-ICH) is a fixed rate (SF=256) physical
channel used to carry CD Indicator (CDI) only if the CA is not
active, or CD Indicator/CA Indicator (CDI/CAI) at the same
time if the CA is active. The structure of CD/CA-ICH is shown
in Figure 33.
WCDMA Theory
50 Confidential and Proprietary Information of ZTE CORPORATION
FI GU R E 33 FR AME STR U C TU R E OF CD/CA-ICH
1024 chips
Transmission Off
AS #14 AS #0 AS #1 AS #i AS #14 AS #0
a1 a2a0 a31a30
CDI/CAI part = 4096 chips, 32 real-valued symbols
20 ms
CD/CA-ICH and AP-AICH may use the same or different
channelisation codes.
The CD/CA-ICH has a part of duration of 4096chips where
the CDI/CAI is transmitted, followed by a part of duration
1024chips with no transmission that is not formally part of
the CD/CA-ICH. The part of the slot with no transmission is
reserved for possible use by CSICH or possible future use by
other physical channels.
The spreading factor (SF) used for channelisation of the
CD/CA-ICH is 256.
Commnon Control Physical Channel
Common control physical channel consists of Primary Common
Control Physical Channel (PCCPCH) and Secondary Common
Control Physical Channel (SCCPCH).
 The Primary CCPCH is a fixed rate (30 kbps, SF=256)
downlink physical channels used to carry the BCH transport
channel.
The frame structure of the Primary CCPCH is shown as Figure
34.
FI GU R E 34 FR AME STR U C TU R E OF P-CCPCH
Data
Ndata1=18 bits
Slot #0 Slot #1 Slot #i Slot #14
Tslot = 2560 chips , 20 bits
1 radio frame: Tf = 10 ms
(Tx OFF)
256 chips
Chapter 3 Channel Structure and Function
51
The frame structure differs from the downlink DPCH in
that no TPC commands, no TFCI and no pilot bits are
transmitted. The Primary CCPCH is not transmitted
during the first 256 chips of each slot. Instead, Primary
SCH and Secondary SCH are transmitted during this
period
 Secondary Commnon Control Physical Channel (S-CCPCH)
The Secondary CCPCH is used to carry the FACH and PCH.
There are two types of Secondary CCPCH: those that include
TFCI and those that do not include TFCI. It is the UTRAN that
determines if a TFCI should be transmitted, hence making it
mandatory for all UEs to support the use of TFCI. The set of
possible rates for the Secondary CCPCH is the same as for
the downlink DPCH. The frame structure of S-CCPCH is
shown in Figure 35.
FI GU R E 35 FR AME STR U C TU R E OF S-CCPCH
Slot #0 Slot #1 Slot #i Slot #14
Tslot = 2560 chips, 20*2k
bits (k=0..6)
Pilot
Npilot bits
Data
Ndata1 bits
1 radio frame: Tf = 10 ms
TFCI
NTFCI bits
The parameter k determines the total number of bits per
downlink Secondary CCPCH slot. It is related to the
spreading factor SF of the physical channel as SF = 256/2k.
The spreading factor range is from 256 down to 4. The FACH
and PCH can be mapped to the same or to separate
Secondary CCPCHs.
If FACH and PCH are mapped to the same Secondary CCPCH,
they can be mapped to the same frame. The main difference
between a CCPCH and a downlink dedicated physical channel
is that a CCPCH is not inner-loop power controlled. The main
difference between the Primary and Secondary CCPCH is that
the transport channel mapped to the Primary CCPCH (BCH)
can only have a fixed predefined transport format
combination, while the Secondary CCPCH support multiple
transport format combinations using TFCI.
Physical Downlink Shared Channel (PDSCH)
The Physical Downlink Shared Channel (PDSCH) is used
to carry the Downlink Shared Channel (DSCH).
WCDMA Theory
52 Confidential and Proprietary Information of ZTE CORPORATION
A PDSCH corresponds to a channelisation code below or
at a PDSCH root channelisation code. A PDSCH is
allocated on a radio frame basis to a single UE. Within
one radio frame, UT RAN may allocate different PDSCHs
under the same PDSCH root channelisation code to
different UEs based on code multiplexing. Within the
same radio frame, multiple parallel PDSCHs, with the
same spreading factor, may be allocated to a single UE.
This is a special case of multi-code transmission. All the
PDSCHs are operated with radio frame synchronisation.
PDSCHs allocated to the same UE on different radio
frames may have different spreading factors.
The frame structure of the PDSCH is shown in Figure 36.
FI GU R E 36 FR AME STR U C TU R E OF PDSCH
Slot #0 Slot #1 Slot #i Slot #14
Tslot = 2560 chips, 20*2k
bits (k=0..6)
Data
Ndata1 bits
1 radio frame: Tf = 10 ms
For each radio frame, each PDSCH is associated with one
downlink DPCH. The PDSCH and associated DPCH do not
necessarily have the same spreading factors and are not
necessarily frame aligned.
All relevant Layer 1 control information is transmitted on
the DPCCH part of the associated DPCH, i.e. the PDSCH
does not carry Layer 1 information. To indicate for UE
that there is data to decode on the DSCH, the TFCI field
of the associated DPCH shall be used.
The TFCI informs the UE of the instantaneous transport
format parameters related to the PDSCH as well as the
channelisation code of the PDSCH.
Physical Layer Procedure
Cell search procedure
During the cell search, the UE searches for a cell and determines
the downlink scrambling code and frame synchronisation of that
cell. The cell search is typically carried out in three steps:
Chapter 3 Channel Structure and Function
53
 Step 1: slot synchronous
During the first step of the cell search procedure the UE uses
the SCH’s primary synchronisation code to acquire slot
synchronisation to a cell. This is typically done with a single
matched filter (or any similar device) matched to the primary
synchronisation code which is common to all cells. The slot
timing of the cell can be obtained by detecting peaks in the
matched filter output.
 Step 2: frame synchronous and code-group identification
During the second step of the cell search procedure, the UE
uses the SCH’s secondary synchronisation code to find frame
synchronisation and identify the code group of the cell found
in the first step. This is done by correlating the received
signal with all possible secondary synchronisation code
sequences, and identifying the maximum correlation value.
Since the cyclic shifts of the sequences are unique the code
group as well as the frame synchronisation is determined.
 Step 3: scrambling-code identification
During the third and last step of the cell search procedure,
the UE determines the exact primary scrambling code used
by the found cell. The primary scrambling code is typically
identified through symbol-by-symbol correlation over the
CPICH with all codes within the code group identified in the
second step. After the primary scrambling code has been
identified, the Primary CCPCH can be detected.And the
system- and cell specific BCH information can be read.
Random Access Procedure
At each initiation of the physical random access procedure, Layer
1 shall receive the following information from the higher layers
(MAC):
 The Transport Format to be used for the PRACH message
part.
 The ASC of the PRACH transmission.
 The data to be transmitted (Transport Block Set).
The physical random-access procedure shall be performed as
follows:
1. Derive the available uplink access slots, in the next full
access slot set, for the set of available RACH sub-channels
within the ASC Randomly select one access slot among the
ones previously determined. If there is no access slot
available in the selected set, randomly select one uplink
access slot corresponding to the set of available RACH sub-
channels within the given ASC from the next access slot set.
The random function shall be such that each of the allowed
selections is chosen with equal probability.
WCDMA Theory
54 Confidential and Proprietary Information of ZTE CORPORATION
2. Randomly select a signature from the set of available
signatures within the given ASC. The random function shall
be such that each of the allowed selections is chosen with
equal probability.
3. Set the Preamble Retransmission Counter to Preamble
Retrans Max.
4. Set the parameter Commanded Preamble Power to
Preamble_Initial_Power.
5. In the case that the Commanded Preamble Power exceeds
the maximum allowed value, set the preamble transmission
power to the maximum allowed power. In the case that the
Commanded Preamble Power is below the minimum level
required in [7], set the preamble transmission power to a
value, which shall be at or above the Commanded Preamble
Power and at or below the required minimum power specified
in [7]. Otherwise set the preamble transmission power to the
Commanded Preamble Power. Transmit a preamble using the
selected uplink access slot, signature, and preamble
transmission power.
6. If no positive or negative acquisition indicator (AI  +1 nor –
1) corresponding to the selected signature is detected in the
downlink access slot corresponding to the selected uplink
access slot:
i. Select the next available access slot in the set of
available RACH sub-channels within the given ASC.
ii. Randomly select a new signature from the set of available
signatures within the given ASC. The random function
shall be such that each of the allowed selections is
chosen with equal probability.
iii. Increase the Commanded Preamble Power by P0 =
Power Ramp Step [dB]. If the Commanded Preamble
Power exceeds the maximum allowed power by 6dB, the
UE may pass L1 status ("No ack on AICH") to the higher
layers (MAC) and exit the physical random access
procedure.
ivi. Decrease the Preamble Retransmission Counter by one.
vii. If the Preamble Retransmission Counter > 0 then repeat
from step 5. Otherwise pass L1 status ("No ack on AICH")
to the higher layers (MAC) and exit the physical random
access procedure.
7. If a negative acquisition indicator corresponding to the
selected signature is detected in the downlink access slot
corresponding to the selected uplink access slot, pass L1
status ("Nack on AICH received") to the higher layers (MAC)
and exit the physical random access procedure.
8. Transmit the random access message three or four uplink
access slots after the uplink access slot of the last
transmitted preamble depending on the AICH transmission
Chapter 3 Channel Structure and Function
55
timing parameter. Transmission power of the control part of
the random access message should be P p-m [dB] higher
than the power of the last transmitted preamble.
9. Pass L1 status "RACH message transmitted" to the higher
layers and exit the physical random access procedure.
57
C h a p t e r 4
Network Transport
Overview
ATM(Asynchronous Transfer Mode) is an effective data
transmission technology in IMT-2000. ATM is the transport
technology used in the first release of the UTRAN, 3GPP R99
implementation.
Ever since 3GPP R5, user data can be transported across all
UTRAN interfaces by using the IP protocol stack as well.
Protocol stacks for ATM and IP transport is shown in Figure 37.
FI GU R E 37 PR OTOC OL STAC K S F OR ATM AN D IP TR AN SPOR T
(a) control-plane protocols in the transport network
(b) user-plane protocols in the transport network
From Release 5, ATM transport and IP transport are equally valid
choices for all user-plane and control-plane UTRAN interfaces.
WCDMA Theory
58 Confidential and Proprietary Information of ZTE CORPORATION
Asynchronous Transfer
Mode in UMTS
Third Generation Partnership Project (3GPP) and Number 2
(3GPP2) standards specify that all the elements of the Radio
Access Network should be interconnected by utilising an ATM
transport network. As a result, currently available UMTS Radio
Access Network (RAN) elements from different manufacturers
are equipped with ATM technology. Practically, this means that
RAN elements include an ATM access port and employ ATM
signalling protocols and switching technology. It is also possible
to use IMA (Inverse Multiplexing for ATM) in RAN. This in turn
brings about the possibility of carrying Iub interface traffic over
GSM transmission routes, allowing network operators to reuse
currently available transmission networks.
In addition to flexible resource sharing, the most important
benefit of using ATM in RAN comes from the way data packets
are formed, classified and carried across the network. Because
each ATM connection is uniquely identified with specific classes,
the network is capable of supporting an efficient QoS
mechanism. This fits well with the bearer architecture thinking of
UMTS defined for different classes of QoS, such as Real Time
(RT) and Non-Real Time (NRT) services, to be supported
simultaneously. These also lead to more efficient resource
management, as the Radio Network Controller (RNC) in the RAN
will be able to schedule and optimise traffic load across the
network. Although ATM will remove the main constraints behind
TDM technology, new limitations arise: ATM signalling is too
complicated and causes undesirable delays and loads to the
network. In addition, ATM may lag behind the reach of
economies of scale, an important advantage of such emerging
technologies as IP. Therefore, transition from ATM towards IP
became the focus of attention in 3GPP and in association with
Releases 4 and 5.
In the current architecture of UMTS, the operator’s transport
network may include base stations (BSs) or Node Bs, RNCs,
Base Station Controllers (BSCs), Mobile Switching Centres
(MSCs), Serving GPRS Support Nodes (SGSNs), and Operat ion
and Management Centres (OMCs). Therefore, ATM-based traffic
in the radio access network can travel over E1 User Network
Interface (UNI) ATM or E1 IMA, or over one or multiple E1 lines
and Synchronous Transport Module 1 (STM-1) links. In order to
support different types of traffic ATM Adaptation Layer Type 2
(AAL2) and ATM Adaptation Layer Type 5 (AAL5) for voice and
data are used. Transmission media could include fibre optics,
E1/T1 copper leased lines, microwave or Digital Subscriber Line
(DSL), depending on the economies of scale and the availability
of media types. It is also possible to combine different kinds of
transmission media. While fibre is the best transport option due
to its speed and capacity, E1/T1, microwave, and DSL bring their
own advantages to the transport network and time after time
Chapter 4 Network Transport
59
they are found to be the only options available due to the cost or
lack of backbone infrastructure and the coexistence of 2G and
3G networks.
In spite of the dominant presence of ATM in the early phase of
UMTS networks, 3GPP has prepared the way for a transition to
IP transport. The original design philosophy of ATM was to
provide good bandwidth granularity while guaranteeing the delay
and jitter requirements for voice services. There is inefficiency in
the handling of data packets due to the small size of the
packets, which cannot be optimised for different traffic flows.
When there is no need for good granularity of ATM (e.g., when
the links have a high bit rate and latency is not so critical), the
use of IP can become more efficient and lucrative. For the
purpose of continuity, however, IP can form an overlay on the
existing ATM backbone and, therefore, ATM will keep its role in
the cellular network in the near future as well.
Basic Configuration of ATM
ATM is a technology that divides information to be transmitted
into 53-byte frames called cells for transmission and switching.
The use of ATM in the RAN is specified under 3GPP Release
1999. There are substantial merits in applying ATM in CN,
including the ability to perform traffic management in
coordination with RAN, implement CS and PS functions in the
same architecture and carry out quality control and operations in
an integral manner. ATM has extensive traffic management and
quality-control functions for handling traffic characteristics, and
is an effective technology for forwarding not only CS services but
also PS services.
A cell, which is the data transfer unit in ATM, consists of a 5-
byte header (which includes routing information etc.) and a 48-
byte payload (storing user data).
FI GU R E 38 ATM C EL L STR U C TU R E
The ATM switching equipment achieves fast switching based on
hardware switching with reference to the routing information in
the header, without detecting data errors in each cell. The
routing information in the header consists of the Virtual Path
(VP) and the Virtual Channel (VC).
ATM cell header structure is shown as Figure 39.
WCDMA Theory
60 Confidential and Proprietary Information of ZTE CORPORATION
FI GU R E 39 ATM CELL HEA DER STRUCTURE
 VPI (Virtual Path Identifier): the identifier for a Virtual
Path (VP) or, more generally, an identifier for a
constantly allocated semi-permanent connection.
 VCI (Virtual Channel Identifier): an identifier for a Virtual
Channel (VC). This field is long because there may be
thousands of channels to be identified within one VP (e.g.,
multimedia applications may require several VCIs
simultaneously, one VC per multimedia component).
 PT (Payload Type): this indicates whether the 48-byte
payload field carries user data or control data.
 CLP (Cell Loss Priority): this is a flag indicating whether
this ATM cell is “important” or “less important”. If CLP 1
(low priority/less important) the system may lose this
ATM cell if it has to.
 HEC (Header Error Control): in ATM, the ATM cell header
is error-protected.
The stratified connection control consisting of VC (which
corresponds to the user channel) and VP (which is a bundle of
VCs) enable highly flexible, extensible operation and
administration. ATM Adaptation Layer type 2 (AAL2) can set
multiple-user connections in VC. Figure 40 illustrates the
structure of ATM connections.
Chapter 4 Network Transport
61
FI GU R E 40 ATM C ON N EC TI ON S
Normally, VP is setup on the basis of system data at the time of
building the network. VC connections can be divided into
Permanent Virtual Channel (PVC), which is inflexibly set up at
the time of network construction, and Switched Virtual Channel
(SVC), which is established and released on the basis of
signaling upon call origination and termination. The
establishment and release of the user connection through the
operation of SVC helps efficiently use ATM connection and
bandwidth resources.
ATM Adaptation Layer (AAL)
AAL is a protocol for coordinating the higher layer, which has
various traffic properties including speech, video streaming and
IP packets, and the ATM layer, which is specified regardless of
the higher-layer application.
Four types of AAL are specified, namely, AAL1,AAL2, AAL3/4 and
AAL5 .
WCDMA Theory
62 Confidential and Proprietary Information of ZTE CORPORATION
FI GU R E 41 ATM ADA P TA TION LA Y ERS (AALS)
 AAL1 is used for forwarding continuous, fixed-rate data,
such as PCM-coded speech.
 AAL2 was originally standardized for the purpose of
efficiently forwarding short frames in ATM; such as
compressed speech data used in mobile communications,
and is applied as the standard for transferring user data
in IMT-2000 RAN.
 AAL3/4 was developed for data communication purposes,
and is distinctive in that it can transfer up to 1024 types
of higher-layer data on one VC connection with a Multiple
Identifier (MID).
 AAL5 is a simpler protocol compared to AAL3/4, and is
widely used for forwarding data packets and control
signals.
AAL2 and AAL5 are applied in IMT-2000 specifications.
As shown in Figure 42, AAL is divided into two sublayers: the
Convergence Sublayer (CS) and the Segmentation And Re-
assembly (SAR) sublayer. The CS adapts AAL to upper protocol
layers and the SAR sublayer splits the data to be transmitted
into suitable payload pieces and, in the receiving direction,
collects payload pieces and assembles them back to the original
dataflow.
Chapter 4 Network Transport
63
FI GU R E 42 GEN ER AL STR U C TU R E OF AAL
TAB L E 6 ATM A DA P T AT ION LA Y ERS U S ED I N UTRAN I N T ERFA CES
Iu Iur Iub
AAL5
CS C-plane
PS C/U-plane
- -
- C-plane -
- - C-plane
AAL2
CS U-plane - -
- U-plane -
- - U-plane
C-plane:Control plane; U-plane: User plane
AAL2
Figure 43 shows the frame structure of AAL2.
FI GU R E 43 AAL2 STR U C TU R E
WCDMA Theory
64 Confidential and Proprietary Information of ZTE CORPORATION
AAL2 has the function to multiplex up to 256 user connections
on one VC connection, and is able to transmit short frames in a
highly efficient manner with limited delay. The Common Part
Sublayer (CPS) packet consists of a 3-byte header and a payload
between 1 and 45 bytes. The header includes a Channel
IDentifier (CID) for user identification. Multiple user connections
can be transmitted by multiplexing them on one VC connection.
CPS packet is carried by CPS-Protocol Data Unit (PDU) to which
a one-byte STart Field (STF) is assigned, and converted into
cells.
Figure 44 illustrates the IMT-2000 interfaces and the AAL type
applied to the user-plane transfer.
FI GU R E 44 RAN I N TER FA C ES
AAL2 is an important protocol applicable from Node B to CN.
Although there are no specifications under 3GPP in regard to
transmissions inside CN, the application of AAL2 in CN enables
the traffic on the interface between Radio Network Contro llers
(RNCs) (Iur Interface) to be physically relayed by CN and
communications between IMT-2000 terminals to be transmitted
by AAL2 between Node Bs, which allows efficient operations.
AAL5
AAL5 is suitable for forwarding signaling data and IP packet
data. Figure 45 illustrates the frame structure of AAL5.
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory
Umtsrns 201 wcdma theory

More Related Content

Similar to Umtsrns 201 wcdma theory

04 geran bc-en-zxg10 i bsc structure and principle-1-training manual-201010 (1)
04 geran bc-en-zxg10 i bsc structure and principle-1-training manual-201010 (1)04 geran bc-en-zxg10 i bsc structure and principle-1-training manual-201010 (1)
04 geran bc-en-zxg10 i bsc structure and principle-1-training manual-201010 (1)Shelton Siziba
 
Zebra sap-smartforms-solution
Zebra sap-smartforms-solutionZebra sap-smartforms-solution
Zebra sap-smartforms-solutionmartin_josep
 
60118029 hsdpa-parameter-description-130219192019-phpapp01
60118029 hsdpa-parameter-description-130219192019-phpapp0160118029 hsdpa-parameter-description-130219192019-phpapp01
60118029 hsdpa-parameter-description-130219192019-phpapp01Hatim100
 
60118029 hsdpa-parameter-description-130219192019-phpapp01
60118029 hsdpa-parameter-description-130219192019-phpapp0160118029 hsdpa-parameter-description-130219192019-phpapp01
60118029 hsdpa-parameter-description-130219192019-phpapp01Hatim100
 
SJ-20140527134054-003-ZXUR 9000 UMTS (V4.13.10.15) Product Description_612439...
SJ-20140527134054-003-ZXUR 9000 UMTS (V4.13.10.15) Product Description_612439...SJ-20140527134054-003-ZXUR 9000 UMTS (V4.13.10.15) Product Description_612439...
SJ-20140527134054-003-ZXUR 9000 UMTS (V4.13.10.15) Product Description_612439...tunaVNP
 
SJ-20140527134054-018-ZXUR 9000 UMTS (V4.13.10.15) Calling Trace Operation Gu...
SJ-20140527134054-018-ZXUR 9000 UMTS (V4.13.10.15) Calling Trace Operation Gu...SJ-20140527134054-018-ZXUR 9000 UMTS (V4.13.10.15) Calling Trace Operation Gu...
SJ-20140527134054-018-ZXUR 9000 UMTS (V4.13.10.15) Calling Trace Operation Gu...tunaVNP
 
Vpecker E4 Diagnostic Tool User Manual OBDII365
Vpecker E4 Diagnostic Tool User Manual OBDII365Vpecker E4 Diagnostic Tool User Manual OBDII365
Vpecker E4 Diagnostic Tool User Manual OBDII365OBD365
 
Umtsrns 208 omcr configuration(rnc data configuration)
Umtsrns 208 omcr configuration(rnc data configuration)Umtsrns 208 omcr configuration(rnc data configuration)
Umtsrns 208 omcr configuration(rnc data configuration)Jose Asuncion Silva Vasquez
 
Umtsrns 208 omcr configuration(rnc data configuration)
Umtsrns 208 omcr configuration(rnc data configuration)Umtsrns 208 omcr configuration(rnc data configuration)
Umtsrns 208 omcr configuration(rnc data configuration)Jose Asuncion Silva Vasquez
 
Umtsrns 208 omcr configuration(rnc data configuration)
Umtsrns 208 omcr configuration(rnc data configuration)Umtsrns 208 omcr configuration(rnc data configuration)
Umtsrns 208 omcr configuration(rnc data configuration)Jose Asuncion Silva Vasquez
 
Command reference (nNEtetwork management)
Command reference (nNEtetwork management)Command reference (nNEtetwork management)
Command reference (nNEtetwork management)prachandra
 
2020 dm expert reference guide
2020   dm expert reference guide2020   dm expert reference guide
2020 dm expert reference guideAnkitKumar250429
 
"ESG Whitepaper: Hitachi Data Systems VSP G1000: - Pushing the Functionality ...
"ESG Whitepaper: Hitachi Data Systems VSP G1000: - Pushing the Functionality ..."ESG Whitepaper: Hitachi Data Systems VSP G1000: - Pushing the Functionality ...
"ESG Whitepaper: Hitachi Data Systems VSP G1000: - Pushing the Functionality ...Hitachi Vantara
 
ZTE Zinger Manual / User Guide
ZTE Zinger Manual / User Guide ZTE Zinger Manual / User Guide
ZTE Zinger Manual / User Guide manualsheet
 
Utran qo s alert actions
Utran qo s alert actionsUtran qo s alert actions
Utran qo s alert actionsWay Tan
 
pro-e-sheet-metal-design
pro-e-sheet-metal-designpro-e-sheet-metal-design
pro-e-sheet-metal-designUmang Dave
 
Vo lte(eran8.1 03)
Vo lte(eran8.1 03)Vo lte(eran8.1 03)
Vo lte(eran8.1 03)Musa Ahmed
 
Ici project 2.docx.
Ici project 2.docx.Ici project 2.docx.
Ici project 2.docx.PK146
 
Rich User Experience by Calibra
Rich User Experience by CalibraRich User Experience by Calibra
Rich User Experience by CalibraLuristic
 

Similar to Umtsrns 201 wcdma theory (20)

04 geran bc-en-zxg10 i bsc structure and principle-1-training manual-201010 (1)
04 geran bc-en-zxg10 i bsc structure and principle-1-training manual-201010 (1)04 geran bc-en-zxg10 i bsc structure and principle-1-training manual-201010 (1)
04 geran bc-en-zxg10 i bsc structure and principle-1-training manual-201010 (1)
 
Zebra sap-smartforms-solution
Zebra sap-smartforms-solutionZebra sap-smartforms-solution
Zebra sap-smartforms-solution
 
60118029 hsdpa-parameter-description-130219192019-phpapp01
60118029 hsdpa-parameter-description-130219192019-phpapp0160118029 hsdpa-parameter-description-130219192019-phpapp01
60118029 hsdpa-parameter-description-130219192019-phpapp01
 
60118029 hsdpa-parameter-description-130219192019-phpapp01
60118029 hsdpa-parameter-description-130219192019-phpapp0160118029 hsdpa-parameter-description-130219192019-phpapp01
60118029 hsdpa-parameter-description-130219192019-phpapp01
 
SJ-20140527134054-003-ZXUR 9000 UMTS (V4.13.10.15) Product Description_612439...
SJ-20140527134054-003-ZXUR 9000 UMTS (V4.13.10.15) Product Description_612439...SJ-20140527134054-003-ZXUR 9000 UMTS (V4.13.10.15) Product Description_612439...
SJ-20140527134054-003-ZXUR 9000 UMTS (V4.13.10.15) Product Description_612439...
 
SJ-20140527134054-018-ZXUR 9000 UMTS (V4.13.10.15) Calling Trace Operation Gu...
SJ-20140527134054-018-ZXUR 9000 UMTS (V4.13.10.15) Calling Trace Operation Gu...SJ-20140527134054-018-ZXUR 9000 UMTS (V4.13.10.15) Calling Trace Operation Gu...
SJ-20140527134054-018-ZXUR 9000 UMTS (V4.13.10.15) Calling Trace Operation Gu...
 
Vpecker E4 Diagnostic Tool User Manual OBDII365
Vpecker E4 Diagnostic Tool User Manual OBDII365Vpecker E4 Diagnostic Tool User Manual OBDII365
Vpecker E4 Diagnostic Tool User Manual OBDII365
 
Umtsrns 208 omcr configuration(rnc data configuration)
Umtsrns 208 omcr configuration(rnc data configuration)Umtsrns 208 omcr configuration(rnc data configuration)
Umtsrns 208 omcr configuration(rnc data configuration)
 
Umtsrns 208 omcr configuration(rnc data configuration)
Umtsrns 208 omcr configuration(rnc data configuration)Umtsrns 208 omcr configuration(rnc data configuration)
Umtsrns 208 omcr configuration(rnc data configuration)
 
Umtsrns 208 omcr configuration(rnc data configuration)
Umtsrns 208 omcr configuration(rnc data configuration)Umtsrns 208 omcr configuration(rnc data configuration)
Umtsrns 208 omcr configuration(rnc data configuration)
 
Command reference (nNEtetwork management)
Command reference (nNEtetwork management)Command reference (nNEtetwork management)
Command reference (nNEtetwork management)
 
2020 dm expert reference guide
2020   dm expert reference guide2020   dm expert reference guide
2020 dm expert reference guide
 
"ESG Whitepaper: Hitachi Data Systems VSP G1000: - Pushing the Functionality ...
"ESG Whitepaper: Hitachi Data Systems VSP G1000: - Pushing the Functionality ..."ESG Whitepaper: Hitachi Data Systems VSP G1000: - Pushing the Functionality ...
"ESG Whitepaper: Hitachi Data Systems VSP G1000: - Pushing the Functionality ...
 
ZTE Zinger Manual / User Guide
ZTE Zinger Manual / User Guide ZTE Zinger Manual / User Guide
ZTE Zinger Manual / User Guide
 
Utran qo s alert actions
Utran qo s alert actionsUtran qo s alert actions
Utran qo s alert actions
 
pro-e-sheet-metal-design
pro-e-sheet-metal-designpro-e-sheet-metal-design
pro-e-sheet-metal-design
 
Vo lte(eran8.1 03)
Vo lte(eran8.1 03)Vo lte(eran8.1 03)
Vo lte(eran8.1 03)
 
Ici project 2.docx.
Ici project 2.docx.Ici project 2.docx.
Ici project 2.docx.
 
Introduction to-zxsdr-products-gsm
Introduction to-zxsdr-products-gsmIntroduction to-zxsdr-products-gsm
Introduction to-zxsdr-products-gsm
 
Rich User Experience by Calibra
Rich User Experience by CalibraRich User Experience by Calibra
Rich User Experience by Calibra
 

More from Jose Asuncion Silva Vasquez

Wcdma p&amp;o-c-en-radio network analysis practice manual
Wcdma p&amp;o-c-en-radio network analysis practice manualWcdma p&amp;o-c-en-radio network analysis practice manual
Wcdma p&amp;o-c-en-radio network analysis practice manualJose Asuncion Silva Vasquez
 
Wcdma p&amp;o-c-en-radio network test practice manual
Wcdma p&amp;o-c-en-radio network test practice manualWcdma p&amp;o-c-en-radio network test practice manual
Wcdma p&amp;o-c-en-radio network test practice manualJose Asuncion Silva Vasquez
 
Wcdma p&amp;o-c-en-wireless technology-2-201006-24
Wcdma p&amp;o-c-en-wireless technology-2-201006-24Wcdma p&amp;o-c-en-wireless technology-2-201006-24
Wcdma p&amp;o-c-en-wireless technology-2-201006-24Jose Asuncion Silva Vasquez
 
Wcdma p&amp;o-c-en-radio network analysis practice manual
Wcdma p&amp;o-c-en-radio network analysis practice manualWcdma p&amp;o-c-en-radio network analysis practice manual
Wcdma p&amp;o-c-en-radio network analysis practice manualJose Asuncion Silva Vasquez
 
Wcdma p&amp;o-c-en-radio network test practice manual
Wcdma p&amp;o-c-en-radio network test practice manualWcdma p&amp;o-c-en-radio network test practice manual
Wcdma p&amp;o-c-en-radio network test practice manualJose Asuncion Silva Vasquez
 
Wcdma p&amp;o-c-en-radio network test practice manual
Wcdma p&amp;o-c-en-radio network test practice manualWcdma p&amp;o-c-en-radio network test practice manual
Wcdma p&amp;o-c-en-radio network test practice manualJose Asuncion Silva Vasquez
 
Wcdma p&amp;o-c-en-wireless technology-2-201006-24
Wcdma p&amp;o-c-en-wireless technology-2-201006-24Wcdma p&amp;o-c-en-wireless technology-2-201006-24
Wcdma p&amp;o-c-en-wireless technology-2-201006-24Jose Asuncion Silva Vasquez
 
Wcdmarnohandoveralgorithmanalysisandparameterconfigurtaionguidance 20050316-a...
Wcdmarnohandoveralgorithmanalysisandparameterconfigurtaionguidance 20050316-a...Wcdmarnohandoveralgorithmanalysisandparameterconfigurtaionguidance 20050316-a...
Wcdmarnohandoveralgorithmanalysisandparameterconfigurtaionguidance 20050316-a...Jose Asuncion Silva Vasquez
 

More from Jose Asuncion Silva Vasquez (20)

Wcdma p&amp;o-c-en-antenna model selection-4-60
Wcdma p&amp;o-c-en-antenna model selection-4-60Wcdma p&amp;o-c-en-antenna model selection-4-60
Wcdma p&amp;o-c-en-antenna model selection-4-60
 
Wcdma p&amp;o-c-en-basal theory-1-201006-33
Wcdma p&amp;o-c-en-basal theory-1-201006-33Wcdma p&amp;o-c-en-basal theory-1-201006-33
Wcdma p&amp;o-c-en-basal theory-1-201006-33
 
Wcdma p&amp;o-c-en-basic theory-1-51
Wcdma p&amp;o-c-en-basic theory-1-51Wcdma p&amp;o-c-en-basic theory-1-51
Wcdma p&amp;o-c-en-basic theory-1-51
 
Wcdma p&amp;o-c-en-channel structure-3-40
Wcdma p&amp;o-c-en-channel structure-3-40Wcdma p&amp;o-c-en-channel structure-3-40
Wcdma p&amp;o-c-en-channel structure-3-40
 
Wcdma p&amp;o-c-en-radio network analysis practice manual
Wcdma p&amp;o-c-en-radio network analysis practice manualWcdma p&amp;o-c-en-radio network analysis practice manual
Wcdma p&amp;o-c-en-radio network analysis practice manual
 
Wcdma p&amp;o-c-en-radio network test practice manual
Wcdma p&amp;o-c-en-radio network test practice manualWcdma p&amp;o-c-en-radio network test practice manual
Wcdma p&amp;o-c-en-radio network test practice manual
 
Wcdma p&amp;o-c-en-wireless technology-2-55
Wcdma p&amp;o-c-en-wireless technology-2-55Wcdma p&amp;o-c-en-wireless technology-2-55
Wcdma p&amp;o-c-en-wireless technology-2-55
 
Wcdma p&amp;o-c-en-wireless technology-2-201006-24
Wcdma p&amp;o-c-en-wireless technology-2-201006-24Wcdma p&amp;o-c-en-wireless technology-2-201006-24
Wcdma p&amp;o-c-en-wireless technology-2-201006-24
 
Wcdma p&amp;o-c-en-radio network analysis practice manual
Wcdma p&amp;o-c-en-radio network analysis practice manualWcdma p&amp;o-c-en-radio network analysis practice manual
Wcdma p&amp;o-c-en-radio network analysis practice manual
 
Wcdma p&amp;o-c-en-radio network test practice manual
Wcdma p&amp;o-c-en-radio network test practice manualWcdma p&amp;o-c-en-radio network test practice manual
Wcdma p&amp;o-c-en-radio network test practice manual
 
Wcdma p&amp;o-c-en-wireless technology-2-55
Wcdma p&amp;o-c-en-wireless technology-2-55Wcdma p&amp;o-c-en-wireless technology-2-55
Wcdma p&amp;o-c-en-wireless technology-2-55
 
4 g qualcomm
4 g qualcomm4 g qualcomm
4 g qualcomm
 
Lte 3 gpp
Lte 3 gpp Lte 3 gpp
Lte 3 gpp
 
Wcdma p&amp;o-c-en-radio network test practice manual
Wcdma p&amp;o-c-en-radio network test practice manualWcdma p&amp;o-c-en-radio network test practice manual
Wcdma p&amp;o-c-en-radio network test practice manual
 
Wcdma p&amp;o-c-en-wireless technology-2-55
Wcdma p&amp;o-c-en-wireless technology-2-55Wcdma p&amp;o-c-en-wireless technology-2-55
Wcdma p&amp;o-c-en-wireless technology-2-55
 
Wcdma p&amp;o-c-en-wireless technology-2-201006-24
Wcdma p&amp;o-c-en-wireless technology-2-201006-24Wcdma p&amp;o-c-en-wireless technology-2-201006-24
Wcdma p&amp;o-c-en-wireless technology-2-201006-24
 
Umtsrns 108 earthing &amp; lightning protection
Umtsrns 108 earthing &amp; lightning protectionUmtsrns 108 earthing &amp; lightning protection
Umtsrns 108 earthing &amp; lightning protection
 
Umtsrns 109 antenna fundamental theory
Umtsrns 109 antenna fundamental theoryUmtsrns 109 antenna fundamental theory
Umtsrns 109 antenna fundamental theory
 
Wcdmarnohandoveralgorithmanalysisandparameterconfigurtaionguidance 20050316-a...
Wcdmarnohandoveralgorithmanalysisandparameterconfigurtaionguidance 20050316-a...Wcdmarnohandoveralgorithmanalysisandparameterconfigurtaionguidance 20050316-a...
Wcdmarnohandoveralgorithmanalysisandparameterconfigurtaionguidance 20050316-a...
 
Wcdmaparameters 130430065026-phpapp02
Wcdmaparameters 130430065026-phpapp02Wcdmaparameters 130430065026-phpapp02
Wcdmaparameters 130430065026-phpapp02
 

Recently uploaded

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Recently uploaded (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 

Umtsrns 201 wcdma theory

  • 1. WCDMATheory Version1.00 ZTE CORPORATION ZTE Plaza, Keji Road South, Hi-Tech IndustrialPark, Nanshan District, Shenzhen, P. R. China 518057 Tel: (86) 755 26771900 800-9830-9830 Fax: (86) 755 26772236 URL: http://support.zte.com.cn E-mail: doc@zte.com.cn
  • 2. LEGAL INFORMATION Copyright © 2006 ZTE CORPORATION. The contents of this document are protected by copyright laws and international treaties. Any reproduction or distribution of this document or any portion of this document, in any form by any means, without the prior written consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by contractualconfidentiality obligations. All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE CORPORATION or of their respective owners. This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose, title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the use of or reliance on the information contained herein. ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications covering the subject matter of this document. Except as expressly provided in any written license between ZTE CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter herein. The contents of this document and all policies of ZTE CORPORATION, including without limitation policies related to support or training are subject to change without notice. Revision History Date Revision No. Serial No. Reason for Revision 7/30/2009 R1.0 sjzlyyyyxxxx First edition
  • 3. ZTE CORPORATION We Values Your Comments & Suggestions! Your opinion is of great value and will help us improve the quality of our product documentation and offer better services to our customers. Please fax to: (86) 755-26772236; or mail to Documentation R&D Department, ZTE CORPORATION, ZTE Plaza, A Wing, Keji Road South, Hi-Tech Industrial Park, Shenzhen, P. R. China 518057. Thank you for your cooperation! Document Name WCDMA Theory Product Version V1.00 Document Revision Number R1.0 Equipment Installation Date Your evaluation of this documentation Presentation: (Introductions, Procedures, Illustrations, Completeness, Level of Detail, Organization, Appearance)  Good  Fair  Average  Poor  Bad  N/A Accessibility: (Contents, Index, Headings, Numbering, Glossary)  Good  Fair  Average  Poor  Bad  N/A Intelligibility: (Language, Vocabulary, Readability & Clarity, Technical Accuracy, Content)  Good  Fair  Average  Poor  Bad  N/A Your suggestions for improvement of this documentation Please check the suggestions which you feel can improve this documentation:  Improve the overview/introduction  Make it more concise/brief  Improve the Contents  Add more step-by-step procedures/tutorials  Improve the organization  Add more troubleshooting information  Include more figures  Make it less technical  Add more examples  Add more/better quick reference aids  Add more detail  Improve the index  Other suggestions __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ __________________________________________________________________________ # Please feel free to write any comments on an attached sheet. If you wish to be contacted regarding your comments, please complete the following: Name Company Postcode Address Telephone E-mail
  • 4. This page is intentionally blank.
  • 5. Contents About this Manual.........................................................................i Purpose........................................................................................ i Intended Audience ....................................................................... i Prerequisite Skill and Knowledge .................................................. i What is in This Manual.................................................................. i Related Documents ......................................................................ii Conventions .................................................................................ii How to Get in Touch....................................................................iii Chapter 1........................................................................................5 Key Technologies.........................................................................5 RAKE Receiver...............................................................5 Power Control................................................................7 Purpose of Power Control in WCDMA............................................7 Power Control Types in WCDMA...................................................8 Open Loop Power Control ............................................................ 8 Close Loop Power Control............................................................ 9 Handover......................................................................9 Mobility.......................................................................................9 Handover Types in WCDMA .......................................................10 Softer Handover........................................................................10 Soft Handover...........................................................................11 Hard Handover..........................................................................12 Handover Procedure..................................................................12 Admission Control ........................................................ 16 Measurement Related to Admission Control ............................... 17 Load Control/Congestion Control..................................... 18 AMR .......................................................................... 19 Chapter 2.....................................................................................21 Interface and Protocol............................................................21
  • 6. Overview.................................................................... 21 UTRAN Common Protocol Model ................................................ 21 The Radio Interface Protocol Reference Model............................ 24 UTRAN Protocol Reference Model............................................... 25 Access Layer and Non-access Layer........................................... 26 Main Protocol Function .................................................. 26 Medium Access Control (MAC) Protocol...................................... 26 Radio Link Control (RLC) Protocol.............................................. 27 Signalling Transport (SCCP) ...................................................... 27 IP Transport for User Data (GTP-U)........................................... 28 Radio Access Network Application Protocol(RANAP) ................... 28 Radio Network Subsystem Application Protocol(RNSAP)............. 28 Node B Application Protocol(NBAP)............................................ 28 Radio Resource Control (RRC) Protocol...................................... 29 Packet Data Convergence Protocol(PDCP).................................. 30 Broadcast Multicast Control(BMC).............................................. 30 UTRAN Frame Protocols(FP) ...................................................... 30 Chapter 3 ....................................................................................31 Channel Structure and Function..........................................31 Overview.................................................................... 31 Channel Type............................................................................ 31 Channel Mapping ...................................................................... 32 Logical Channel ........................................................... 35 Transport Channel ....................................................... 35 Physical Channel.......................................................... 37 Uplink Physical Channel............................................................. 37 Downlink Physical Channel ........................................................ 42 Physical Layer Procedure ............................................... 52 Cell search procedure................................................................ 52 Random Access Procedure......................................................... 53 Chapter 4 ....................................................................................57 Network Transport...................................................................57 Overview.................................................................... 57 Asynchronous Transfer Mode in UMTS ............................. 58 Basic Configuration of ATM........................................................ 59 ATM Adaptation Layer (AAL)...................................................... 61
  • 7. AAL2.........................................................................................63 AAL5.........................................................................................64 QoS Classes Under 3GPP ...........................................................65 ATM Service Class .....................................................................66 IP Transport in UMTS.................................................... 67 Chapter 5.....................................................................................71 Procedure Examples................................................................71 Elementary Procedures ................................................. 71 Paging.......................................................................................73 RRC Connection Setup............................................................... 75 Transaction Reasoning............................................................... 77 Authentication and Security Control...........................................78 Transaction Setup with Radio Access Bearer (RAB) Allocation.....79 Transaction...............................................................................81 Transaction Clearing and RAB Release .......................................82 RRC Connection Release............................................................85 Chapter 6.....................................................................................87 WCDMA Evolved........................................................................87 WCDMA Evolved Overview ............................................. 87 HSDPA ....................................................................... 87 The Concept of HSDPA ..............................................................87 Shared channel transmission.....................................................88 Higher-order modulation ...........................................................89 Short transmission time interval (TTI) .......................................90 Fast link adaptation...................................................................90 Fast scheduling .........................................................................91 Fast hybrid automatic-repeat-request (ARQ)..............................92 Figures .........................................................................................95 Tables...........................................................................................99
  • 8. This page is intentionally blank.
  • 9. Confidential and Proprietary Information of ZTE CORPORATION i About this Manual Purpose This Manual provides WCDMA theory introduction. Readers can get an overall understanding of WCDMA. Intended Audience This document is intended for engineers and technicians who perform operation activities on the ZXWR RNS(RNC and Node B family) equipment. Prerequisite Skill and Knowledge To use this document effectively, users should have a general understanding of wireless telecommunications technology. Familiarity with the following is helpful:  Mobile communication knowledge  Computer operation ability What is in This Manual This Manual contains the following chapters: TAB L E 1 CH APTER SU MMAR Y Chapter Summary Chapter 1 Key Technologies Introduces the key technologies in WCDMA, including RAKE receiver, power control, handover, admission control, load control/congestion control and AMR. Chapter 2 Interface and Protocol Introduces WCDMA interface and protocol, including protocol model, main protocol function. Chapter 3 Channel Introduces channel types, channel
  • 10. WCDMA Theory ii Confidential and Proprietary Information of ZTE CORPORATION Chapter Summary Structure and Function mapping, channel frame structure and function. Chapter 4 Network Transport Introduces ATM and IP transport in WCDMA network. Chapter 5 Procedure Examples Introduces WCDMA elementary procedure. Chapter 6 WCDMA Evolved Introduces HSDPA technologies mainly. Figures Provides figure list in this manual. Tables Provides table list in this manual. Related Documents The following document is related to this manual:  WCDMA Basics Conventions ZTE documents employ the following typographical conventions. TAB L E 2 TYPOGR APH I C AL CON VEN TI ON S Typeface Meaning Italics References to other Manuals and documents. “Quotes” Links on screens. Bold Menus, menu options, function names, input fields, radio button names, check boxes, drop- down lists, dialog box names, window names. CAPS Keys on the keyboard and buttons on screens and company name. Constant width Text that you type, program code, files and directory names, and function names. [ ] Optional parameters. { } Mandatory parameters. | Select one of the parameters that are delimited by it. Note: Provides additional information about a certain topic. Checkpoint: Indicates that a particular step needs to be checked before proceeding further. Tip: Indicates a suggestion or hint to make things easier or more productive for the reader. Typographical Conventions
  • 11. About this Manual Confidential and Proprietary Information of ZTE CORPORATION iii TAB L E 3 M OU SE OPER ATI ON CON VEN TI ON S Typeface Meaning Click Refers to clicking the primary mouse button (usually the left mouse button) once. Double-click Refers to quickly clicking the primary mouse button (usually the left mouse button) twice. Right-click Refers to clicking the secondary mouse button (usually the right mouse button) once. Drag Refers to pressing and holding a mouse button and moving the mouse. How to Get in Touch The following sections provide information on how to obtain support for the documentation and the software. If you have problems, questions, comments, or suggestions regarding your product, contact us by e-mail at support@zte.com.cn. You can also call our customer support center at (86) 755 26771900 and (86) 800-9830-9830. ZTE welcomes your comments and suggestions on the quality and usefulness of this document. For further questions, comments, or suggestions on the documentation, you can contact us by e-mail at doc@zte.com.cn; or you can fax your comments and suggestions to (86) 755 26772236. You can also browse our website at http://support.zte.com.cn, which contains various interesting subjects like documentation, knowledge base, forum and service request. Mouse Operation Conventions Customer Support Documentation Support
  • 12. WCDMA Theory iv Confidential and Proprietary Information of ZTE CORPORATION This page is intentionally blank.
  • 13. Confidential and Proprietary Information of ZTE CORPORATION 5 C h a p t e r 1 Key Technologies RAKE Receiver Since multipath signals contain useful information, CDMA receivers improve the S/N of the received signals by combining multipath signals. What a RAKE receiver does is to receive the various channels of signals from multipath signals through multiple related detectors, and then combine them. The RAKE receiver is a classical diversity receiver specially designed for the CDMA system. Its theoretical basis is that when the propagation delay exceeds one chip code cycle, multipath signals are actually seen to be mutually irrelevant. RAKE reception separates and combines multipath signals. Different from the IS-95 A, WCDMA has three times of multipath resolving power. In addition, in a WCDMA system, the pilot information sent by the user can be used for coherent combination on the reverse link. The theoretical analysis of WCDMA shows that if the reverse link uses 8-path RAKE reception, over 75% signal energies are used. The suppression of the RAKE reception for multiple access interference depends on the correlation between the different user characteristic codes. Maximal ratio RAKE combining of symbols is shown as Figure 1.
  • 14. WCDMA Theory 6 Confidential and Proprietary Information of ZTE CORPORATION FI GU R E 1 M AXI MAL R ATI O “RAKE” C OMB I N I N G OF SYMB OL S Channel can rotate the signal to any phase and to any amplitude. QPSK symbols carry information in phase. Energy splitted to many finger -> combining. Maximal ratio combining corrects channel phase rotation and weights components with channel amplitude estimate. RAKE diversity receiver is shown as Figure 2. FI GU R E 2 RAKE DI VER SI TY REC EI VER A rake receiver is a radio receiver designed to counter the effects of multipath fading. It does this by using several "sub- receivers" called fingers, that is, several correlators each assigned to a different multipath component. Each finger independently decodes a single multipath component; at a later stage the contribution of all fingers are combined in order to make the most use of the different transmission characteristics of each transmission path.
  • 15. About this Manual Confidential and Proprietary Information of ZTE CORPORATION 7 Power Control Quality Of Service (QOS) that radio cell network provides for each subscriber mainly depends on signal-to-interference ratio (SIR) of subscriber receiving signals. For CDMA cell system, all subscribers in same cell use same band and timeslot, and subscribers are isolated with each other only by the (quasi-) orthogonalization of spreading code. Correlation characteristics between each subscriber signals are not so good and signals of other subscribers interfere signals of current subscribers, due to multipath and delay of the radio channels. Increasing of subscribers or power of other subscribers may enhance interference on current subscriber. Therefore, CDMA system is a strong power-restricted system and strength of interference influences system capacity directly. Power control is regarded as one of the key technologies of CDMA system. Power control adjusts transmission power of each subscriber, compensates channel attenuation, countervails near- far effect and maintains all subscribers at lowest standard of normal communication. It reduces interference on other subscribers at most, increases system capacity and prolongs holding time of mobile phones. To achieve acceptable call quality when the TX power is small, both the BS and the MS are required to adjust power needed by the transmitter in real time according to the communication distance and link quality. This process is called "power control". Purpose of Power Control in WCDMA Power control in uplink must make signal powers from different users nearly equal in order to maximize the total capacity in the cell. In downlink the power control must keep the signal at minimal required level in order to decrease the interference to users in other cells. Purpose of power control in WCDMA aims at  Removes near-far effect.  Mitigates fading.  Compensates changes in propagation conditions.  In the system level  decrease interference from other users
  • 16. WCDMA Theory 8 Confidential and Proprietary Information of ZTE CORPORATION  increase capacity of the system Power Control Types in WCDMA Power control of WCDMA includes the fellowing types.  Open loop power control Open loop power control is for initial power setting of MS. Open loop power control is based on the assumption that the uplink and downlink channels are symmetric. It can counteract path loss and shadow fade.  Closed loop power control  Inner loop power control is used to combat channel fade and loss, so that the SIR or power of the received signals can reach the specific target value.  Outer loop power control generates the SIR or power threshold for inner power control according to the QoS in the specific environment. . Open Loop Power Control Open loop power control mechanisms attempt to make a rough estimate of path loss by means of a downlink beacon signal. Such a method would be far too inaccurate. The prime reason for this is that the fast fading is essentially uncorrelated between uplink and downlink, due to the large frequency separation of the uplink and downlink bands of the WCDMA FDD mode. Open loop power control is, however, used in WCDMA, but only to provide a coarse initial power setting of the mobile station at the beginning of a connection. FI GU R E 3 OPEN LOOP POW ER CON TR OL
  • 17. About this Manual Confidential and Proprietary Information of ZTE CORPORATION 9 Close Loop Power Control Close loop power control can be divided into inner loop power control and outer power control.  Inner loop power control Inner loop power control is fast closed power control, with fast speed 1500 times/second, conduting in physical layer between BS and MS. If SIR measured in physical layer is lower than target SIR, BS will send increase power command to MS, and vice versa. Power control command includes increase power, decrease power and retain power. Step is 1 dB every time.  Outer loop power control Outer power control is slow close loop power control,usually conduting in one TTI(10ms,20ms,40ms,80ms). Outer power control is over physical layer, and calculates BLER through testing CRC correctness or not to determine the value of target SIR.  The relationship between inner loop power control and outer loop power control The outer loop power control is a kind of slow changing adjustment between RNC and Node B, while the inner loop power control is a kind of fast changing adjustment between NodeB and UE. Why need both inner loop power control and outer loop power control? It is hard to get exactly accurate SIR measurement result during SIR measurement. SIR and BER(or BLER) is environmental changing and nonlinear. For instance, in one kind of multipath spreading environment, BLER 1/100 need SIR 5 dB,while in another kind of multipath spreading environment same BLER need SIR maybe 5.5 dB. That means quality of service is directly determined by BLER not by SIR(SIR only indirectly determined Qos) . Handover Mobility Mobility provides the possibility of being reachable anywhere and any time for the end-user. The mobility is provided through:
  • 18. WCDMA Theory 10 Confidential and Proprietary Information of ZTE CORPORATION Handover: gurantees that whenever the mobile is moving from one BS area/cell to another, the signal is handed over to the target BS. When there is no continuous active radio link between mobile and BS, the mobility is supported by:  Location update: user registers in the network that it can be found in given area. Mobile always initiates the location update procedure.  Paging: indication to the user about the the need for transaction. Paging procedure is always initiated by the network. Handover Types in WCDMA 1. Intra-system handovers  Intra-frequency handovers MS handover within one cell between different sectors: Softer handover MS handover between different BS:  Soft handover  Hard handover  Inter-frequency handovers Hard handover 2. Inter-system handovers  Handover between WCDMA <-- > GSM900/1800: Hard handover  Handower between WCDMA/FDD <--> TDD: Hard handover Softer Handover Softer handover refers to handover between cells with same frequency and in same base station, as shown in Figure 4.
  • 19. About this Manual Confidential and Proprietary Information of ZTE CORPORATION 11 FI GU R E 4 SOF TER H AN D OVER While MS in overlapping cell coverage area of two adjacent sectors of a BS, communication between MS and BS is via two air interface channels (one for each separate sector). Different sectors have different scrambling codes. MS tunes the RAKE fingers to different sectors and combines the outputs. BS receives signals with different antennas and decodes and combines them. Soft Handover Soft handover refers to adding a new link (the old and the new links exist at the same time) and deleting the old one after stabilization. Services continue in the handover, as shown in Figure 5. FI GU R E 5 SOF T HAN D OVER
  • 20. WCDMA Theory 12 Confidential and Proprietary Information of ZTE CORPORATION MS: At Rake Maximal Ratio Combining of signals from different BS. BS: Frame selection. Extra transmission across Iub. Difference of soft handover and softer handover is that combination of radio links is realized by RNC for soft handover while is realized in Node B (decided by RNC) for softer handover. Hard Handover Hard handover refers to deleting the old link and then building a new link. Services break off during the handover, as shown in Figure 6. FI GU R E 6 HAR D HAN D OVER Node B Node B Cell 1 Cell 2 Handover Procedure 1. The basic process of handover is shown as Figure 7. i. Measurement (UE); report on measurement results (report from UE to RNC) ii. RNC decides whether to perform handover according to the report and algorithm (RNC sends the command of handover to UE if it is necessary). iii. Handover execution
  • 21. About this Manual Confidential and Proprietary Information of ZTE CORPORATION 13 FI GU R E 7 TH E B ASI C PR OC ESS OF H AN D OVER Figure 8 shows detailed flow of handover. FI GU R E 8 HAN D OVER FL OW Active Set: is a set of signal branches (Cells) through which the MS has simultaneously connection to the UTRAN. In 3GPP, events correlative to handover are:  Event correlative to soft handover in the band: 1A ~ 1F Measured value is usually Ec/N0 of pilot channel, reflecting the quality of a certain cell. 3GPP defines a series of
  • 22. WCDMA Theory 14 Confidential and Proprietary Information of ZTE CORPORATION measurement events in the band. UE reports corresponding events when meeting definitions. FI GU R E 9 EVEN T C OR R EL ATI VE TO SOF T H AN D OVER Event Description Event 1A Quality of target cell improves, entering a report range of relatively activating set quality Event 1B Quality of target cell decreases, depart from a report range of relatively activating set quality Event 1C The quality of a non-activated set cell is better than that of a certain activated set cell Event 1D Best cell generates change Event 1E Quality of target cell improves, better than an absolute threshold Event 1F Quality of target cell decreases, worse than an absolute threshold  Event correlative to hard handover between bands: 2A ~ 2F Ec/N0 is measured value, reflecting quality of operators by measuring cells at different bands. UE reports corresponding events when meeting definitions. FI GU R E 10 EVEN T C OR R EL ATI VE TO H AR D H AN D OVER Event Description Event 2A Best band generates change Event 2B Quality of currently-used band is worse than an absolute threshold and that of non-used band is better than an absolute threshold Event 2C Quality of non-used band is better than an absolute threshold Event 2D Quality of currently-used band is worsethan an absolute threshold Event 2E Quality of non-used band is worse than an absolute threshold Event 2F Quality of currently-used band is better than an absolute threshold  Event correlative to handover between systems: 3A ~ 3D RSSI is measured value for GSM. UE reports corresponding events when meeting definitions. FI GU R E 11 EVEN T C OR R EL ATI VE TO H AN D OVER B ETW EEN SYSTEMS Event Description Event 3A Quality of currently-used UTRAN operator is worse than an absolute threshold and quality of other radio systems is better than an absolute threshold Event 3B Quality of other radio systems is worse than an absolute threshold Event 3C Quality of other radio systems is better than an absolute threshold Event 3D Best cell in other systems generates change For example: Adding a radio link in soft handover and Figure 12 shows signaling process of handover.
  • 23. About this Manual Confidential and Proprietary Information of ZTE CORPORATION 15 FI GU R E 12 SOF T HAN D OVER (AD D I N G A LI N K ) SI GN AL I N G FL OW 2. Compression mode UE has only one RF reception unit and can only decode signals of one frequency at one time. Therefore, compression mode is necessary if measuring two cells of different bands or different cells. Figure 13 shows compression mode priciple.
  • 24. WCDMA Theory 16 Confidential and Proprietary Information of ZTE CORPORATION FI GU R E 13 COMPR ESSI ON M OD E PR I N C I PL E Dat a Compressi on1 Frame/ 10 ms 1 f rame Compressed I dl e t i me f or het ero-f requency measurement 1 f rame uncompressed In compression mode, Node B compresses data when sending some downlink channel frames. UE takes advantage of remaining time for measurement of different bands. Compression mode can be realized by drilling and halving spreading factors, and so on. When measuring between frequencies, the system negotiates with UE whether to support and select compression mode. Admission Control The idea behind admission control strategies is as follows. When a user originates a call to the network requesting a desired QoS, the network must do two things before accepting the call request. First, it must make sure that it has sufficient bandwidth to allocate to that user. Second, it must determine if, after admitting the user, it can continue to provide the same QoS for all existing connections. One QoS objective may be a desired packet loss probability. Thus, before the network admits the new user, it should determine whether it can meet that packet loss probability goal for all connections, old as well as new. Call admission control decides to accept or refuse a new subscriber, new Radio Access Bearer (RAB) and new Radio Link (RL) according to current resource (such as, handover). Call admission control is applicable to original UE access, RAB designation, reconfiguration and handover. It may lead to different results because of PRI and actual situations.
  • 25. About this Manual Confidential and Proprietary Information of ZTE CORPORATION 17 Call admission control meets QOS of new calls as much as possible premising the stability of the system, based on interference measurement, to avoid overloading. Call admission control falls into:  Uplink call admission control  Downlink call admission control WCDMA is a self-interference system and there exists power climbing. The core is power. Uplink capacity depends on whether total receiving interference power is beyond linear dynamic range of LNA or not. Downlink capacity depends on whether the distribution of transmission power completes or not. Process of call admission control: Measure current load of system cell when making calls (new access calls and handover calls), and forecast and estimate calls, then judge whether to access calls. Take QOS requirements of calls. That is, communication rate, communication quality (signal-to-noise ratio and error code ratio) and delay into consideration when forecasting calls. Refuse the call when it approaches some threshold. Service calls fall into new calls and handover calls. Reserve some resources for handover calls to ensure high ratio of successful handovers. PRI of handover calls is distinguished by admission control threshold. Admission control threshold of new calls is lower than that of handover calls. New calls are refused when current load of the cell is higher than admission threshold of new calls. However, handover calls are accepted. Handover ratio is better to be at about 35% in soft handover. Handover calls are also refused when the load of the cell is higher than handover admission control threshold. Load control threshold is commonly higher than admission control threshold of handover, to prevent overloading when radio circumstances change and to ensure the stable running of the system. Measurement Related to Admission Control  Node B Common Measurement  DCH measurement Major factors to influence WCDMA system capacity (DCH) are uplink interference and downlink operator emission power. DCH admission control performs admission decision on these two parameters. Node B reports RTWP and TCP of Node B common measurement to RNC periodically, so that RNC can decide whether to access the new call according to latest load.  HS-DSCH measurement
  • 26. WCDMA Theory 18 Confidential and Proprietary Information of ZTE CORPORATION HS-DSCH admission control needs Node B common measurement information related to HSDPA, including HS-DSCH required power, transmitted operator power of all codes not used for HS-PDSCH or HS-SCCH transmission. Therefore, open these common measurements simultaneously in cells supporting HSDPA.  RACH measurement According to policies of ZTE, to estimate the load, RACH starts up acknowledged PRACH preambles common measurement during the admission control, to get actual utilization ratio of PRACH channel.  UE measurement When predicting downlink power, RNC needs real-time route loss of UE. RNC can get route loss of UE by different means according to admission requests type, such as, reporting through some events of UE. Load Control/Congestion Control  Process of load control The system measures the load of the system cell at real time continually. The system load is high and the load enters unstable running district of the system when load average value exceeds some threshold value in a set time. Load control is necessary at the moment.  Load control threshold The core of load control is to access as many services as possible premising that the system is running stably, to realize high efficient running. Leave some redundancy, excluding base line for system breakdown, as threshold value of load control. Threshold value of load control is larger than that of admission control.  Load control mode Load control works when system load approaches or exceeds load threshold value. Main modes:  Reduce the load in a rapid mode, which is mainly realizes by base station (Node B). Downlink rapid load control: Refusing the command to increase the power from the mobile station. Uplink rapid load control: Reducing SIR destination value for uplink rapid power control.  Reduce the load in medium or slow mode, which is mainly realized by base station controller (RNC).
  • 27. About this Manual Confidential and Proprietary Information of ZTE CORPORATION 19 Commonly, RNC makes judgment and changes max allowed transmission power, destination SIR value and TFCS by reconfiguring the RL. In this mode, the system load can be reduced for a long time. Make negotiations if hoping to reduce the system load for a long time, that is, RNC negotiates with CN to reduce resource occupation of services during the communications. Or, share loads with adjacent cells in RNS to reduce the load of those overloading cells. The taking-in and sending-out of adjacent cells (covering radius of one cell increases and that of another adjacent cell decreases) is called cell breathing. Conclusions:  Reducing the throughput of grouping (reducing the transmission rate)  Handing over to other WCDMA carrier frequency  Handing over to GSM system  Reducing the rate of real-time services  Executing the call drops AMR Adaptive Multi Rate (AMR) code is a voice-coding plan. It is called broadband AMR (AMR-WB or AMR Wideband) in WCDMA. Current GSM speech coding (FR, HR, EFR and AMR) is applicable to narrowband speech and audio bandwidth is limited to 3.4 kHz. Audio bandwidth of AMR-RB extends to 7 kHz, which makes the voice much clearer and natural, especially in hands-free situations. AMR provides eight coding rates of 4.7 k, 5,15 k, 5.9 k, 6.7 k, 7.4 k, 7.95 k, 10.2 k and 12.2 k. Select codes with low rate on condition that it does not influence communication quality, to save network resource.
  • 28.
  • 29. 21 C h a p t e r 2 Interface and Protocol Overview UTRAN Common Protocol Model Figure 14 shows the general protocol model for UT RAN Interfaces, and described in detail in the following subclauses. The structure is based on the principle that the layers and planes are logically independent of each other. Therefore, as and when required, the standardisation body can easily alter protocol stacks and planes to fit future requirements. FI GU R E 14 UTRAN COMMON PR OTOC OL M OD EL Application Protocol Data Stream(s) ALCAP(s) Transport Network Layer Physical Layer Signalling Bearer(s) Transport User Network Plane Control Plane User Plane Transport User Network Plane Transport Network Control Plane Radio Network Layer Signalling Bearer(s) Data Bearer(s) Horizontal, The Protocol Structure consists of two main layers:  Radio Network Layer
  • 30. WCDMA Theory 22 Confidential and Proprietary Information of ZTE CORPORATION  Transport Network Layer. All UT RAN related issues are visible only in the Radio Network Layer, and the Transport Network Layer represents standard transport technology that is selected to be used for UTRAN, but without any UTRAN specific requirements. Vertical, UTRAN falls into the following 4 planes:  Control Plane Purpose of the control plane: Control the radio access bearer and the connection between UE and the network; Transmit messages of non-access layer transparently. The Control Plane includes the application protocol and the Signaling Bearer for transporting the Application Protocol messages. The control plane protocols of each interface on RNL include: Interface Iu: RANAP protocol Interface Iur: RANSAP protocol Interface Iub: NBAP protocol Interface :Uu: RRC protocol Among other things, the Application Protocol is used for setting up bearers for (i.e. Radio Access Bearer or Radio Link) in the Radio Network Layer. In the three plane structure the bearer parameters in the Application Protocol are not directly tied to the User Plane technology, but are rather general bearer parameters. The Signalling Bearer for the Application Protocol may or may not be of the same type as the Signalling Protocol for the ALCAP. The Signalling Bearer is always set up by O&M actions.  User Plane Purpose of user plane: Transmit the user data via the access network. The User Plane Includes the Data Stream(s) and the Data Bearer(s) for the Data Stream(s). The Data Stream(s) is/are characterised by one or more frame protocols specified for that interface.  TNL Control Plane TNL control plane protocol is ALCAP, belonging to SAAL (Signalling AAL) of ATM. The Transport Network Control Plane does not include any Radio Network Layer information, and is completely in the Transport Layer. It includes the ALCAP protocol(s) that is/are needed to set up the transport bearers (Data
  • 31. Chapter 2 Interface and Protocol 23 Bearer) for the User Plane. It also includes the appropriate Signalling Bearer(s) needed for the ALCAP protocol(s). The Transport Network Control Plane is a plane that acts between the Control Plane and the User Plane. The introduction of Transport Network Control Plane makes it possible for the Application Protocol in the Radio Network Control Plane to be completely independent of the technology selected for Data Bearer in the User Plane. When Transport Network Control Plane is used, the transport bearers for the Data Bearer in the User Plane are set up in the following fashion. First there is a signalling transaction by the Application Protocol in the Control Plane, which triggers the set up of the Data Bearer by the ALCAP protocol that is specific for the User Plane technology. The independence of Control Plane and User Plane assumes that ALCAP signalling transaction takes place. It should be noted that ALCAP might not be used for all types Data Bearers. If there is no ALCAP signalling transaction, the Transport Network Control Plane is not needed at all. This is the case when pre-configured Data Bearers are used. It should also be noted that the ALCAP protocol(s) in the Transport Network Control Plane is/are not used for setting up the Signalling Bearer for the Application Protocol or for the ALCAP during real time operation. The Signalling Bearer for the ALCAP may or may not be of the same type as the Signalling Bearer for the Application Protocol. The Signalling Bearer for ALCAP is always set up by O&M actions.  TNL User Plane The user plane data and control plane data of all RNL belong to TNL user plane. The Data Bearer(s) in the User Plane, and the Signalling Bearer(s) for Application Protocol, belong also to Transport Network User Plane. As described in the previous subclause, the Data Bearers in Transport Network User Plane are directly controlled by Transport Network Control Plane during real time operation, but the control actions required for setting up the Signalling Bearer(s) for Application Protocol are considered O&M actions.
  • 32. WCDMA Theory 24 Confidential and Proprietary Information of ZTE CORPORATION The Radio Interface Protocol Reference Model FI GU R E 15 RAD I O I N TER F AC E PR OTOC OL R EF ER EN C E MOD EL L1 – radio physical layer L2 – radio link layer L3 – radio network layer  L1: As shown in Figure 15, the physical layer provides its services as a set of WCDMA transport channels. This makes the physical layer responsible for the first multiplexing function: to map the flows from transport channels to WCDMA physical channels and vice versa.  L2: The radio link layer is another multiplexing layer, one that makes a major contribution to dynamic sharing of capacity in the WCDMA radio interface. Instead of the wide variety of L1 transport channels this layer allows the upper layer to see only a set of radio bearers, along which different kinds of traffic can be transmitted over the radio link.  The Medium Access Control (MAC) sublayer controls the use of the transport block capacity by ensuring that capacity allocation decisions (done at the UTRAN end) are executed promptly at both ends of the radio interface.
  • 33. Chapter 2 Interface and Protocol 25  The Radio Link Control (RLC) sublayer then adds regular link layer functions onto the logical channels provided by the MAC sublayer.  For CS domain data (e.g., transcoded speech) the convergence function is null, but for the PS domain an additional convergence sublayer is needed. This Packet Data Convergence Protocol (PDCP) sublayer makes the UMTS radio interface applicable to carry Internet Protocol (IP) data packets.  BMC has been specified for message broadcast and multicast domains. The scheduling and delivery of cell broadcast messages to User Equipment (UEs) is the main task of this protocol.  L3: The L3 control plane protocol is the Radio Resource Control (RRC) protocol. As shown in Figure 15, an RRC protocol entity at both the UE and UTRAN ends has control interfaces with all other protocol entities. UTRAN Protocol Reference Model
  • 34. WCDMA Theory 26 Confidential and Proprietary Information of ZTE CORPORATION Access Layer and Non-access Layer The concepts of access layer and non-access layer are related to the communication of UE and CN. The access layer bears the upper layer services via the SAP (Service Access Point), as shown in Figure 16. FI GU R E 16 AC C ESS LAYER AN D NON -AC C ESS LAYER UTRANUE CN Access Stratum Non-Access Stratum Radio (Uu) Iu Radio proto- cols (1) Radio proto- cols (1) Iu proto cols (2) Iu proto cols (2) The UTRAN AP and frame protocols together form the UMTS access stratum, which covers all those communication aspects that are dependent on the selected radio access technology. Within generic UMTS radio access bearers, non-access stratum protocols are then used for direct transfer of signalling and transparent flow of user data frames between UEs and the CN. This is achieved by encapsulation of the higher layer payload into UTRAN protocol messages. Main Protocol Function Medium Access Control (MAC) Protocol The Medium Access Control Protocol performs the following functions:  Mapping between logical channels and transport channels.  Selection of appropriate Transport Format for each Transport Channel depending on instantaneous source rate.  Priority handling between data flows of one UE.
  • 35. Chapter 2 Interface and Protocol 27  Priority handling between UEs by means of dynamic scheduling.  Identification of UEs on common transport channels.  Multiplexing/demultiplexing of upper layer PDUs into/from transport block sets delivered to/from the physical layer on dedicated transport channels.  Traffic volume measurement.  Transport Channel type switching.  Ciphering for transparent mode RLC.  Access Service Class selection for RACH and CPCH transmission. The complete specification of the MAC protocol is given in 3GPP specification TS25.321. Radio Link Control (RLC) Protocol The Radio Link Control Protocol performs the following functions:  Segmentation and reassembly.  Concatenation.  Padding.  Transfer of user data.  Error correction.  In-sequence delivery of upper layer PDUs.  Duplicate detection.  Flow control.  Sequence number check.  Protocol error detection and recovery.  Ciphering.  SDU discard. The complete specification of the RLC protocol is given in 3GPP specification TS25.322. Signalling Transport (SCCP) SCCP is derived from SS7 and provides both a connectionless and connection-oriented service. The connection-oriented service is used to support signaling bearers.
  • 36. WCDMA Theory 28 Confidential and Proprietary Information of ZTE CORPORATION IP Transport for User Data (GTP-U) The main functions of GTP-U are:  Data packet transfer.  Encapsulation and tunnelling.  Data packet sequencing.  Path alive check. GTP-U is defined in 3GPP specification TS 29.060. Radio Access Network Application Protocol(RANAP) RANAP is the protocol that controls resources in the Iu interface. One RANAP entity resides in the RNC and another peer entity resides in the MSC server or the SGSN. The detailed specification for RANAP is given by 3GPP specification TS 25.413. Radio Network Subsystem Application Protocol(RNSAP) RNSAP is responsible for bearer management signalling across the Iur interface. RNSAP is used for setting up radio links and allowing the SRNC to control these radio links using dedicated resources in a DRNC. The complete specification of RNSAP is given in 3GPP specification TS 25.423. Node B Application Protocol(NBAP) NBAP is a radio network layer protocol that maintains control- plane signaling across the Iub interface and, thus, controls resources in the Iub interface and provides a means for the BS and RNC to communicate. The complete specification of NBAP is given in 3GPP specification TS 25.433.
  • 37. Chapter 2 Interface and Protocol 29 Radio Resource Control (RRC) Protocol The RRC protocol is the key radio resource control protocol within the UTRAN. The major function of the RRC protocol is to control the radio bearers, transport channels and physical channels. This is done by set-up, reconfiguration and release of different kinds of radio bearers. The Radio Resource Control Protocol performs the following functions:  Cell Broadcast Service (CBS) control.  Initial cell selection and cell re-selection.  Paging.  Broadcast of information: – related to the non-access stratum (Core Network). – related to the access stratum.  Establishment, maintenance and release – of an RRC connection between the UE and UTRAN. – of Radio Bearers.  Assignment, reconfiguration and release of radio resources for the RRC connection.  Control of requested QoS.  UE measurement reporting and control of the reporting.  RRC message integrity protection.  Arbitration of radio resources on uplink DCH.  Slow Dynamic Channel Allocation (DCA) (TDD mode).  Timing advance (TDD mode).  RRC connection mobility functions (RNC relocation).  Outer loop power control.  Control of ciphering. The RRC protocol is specified in 3GPP specification TS 25.331.
  • 38. WCDMA Theory 30 Confidential and Proprietary Information of ZTE CORPORATION Packet Data Convergence Protocol(PDCP) As its name suggests PDCP is designed to make WCDMA radio protocols suitable for carrying the most common user-to-user packet data protocol, TCP/IP. The Packet Data Convergence Protocol performs the following functions:  Header compression and decompression of IP data streams (e.g., TCP/IP and RTP/UDP/IP headers for IPv4 and IPv6) at the transmitting and receiving entity, respectively.  Transfer of user data. This function is used for conveyance of data between users of PDCP services.  Maintenance of PDCP sequence numbers for radio bearers that are configured to support lossless SRNS Relocation. The complete specification of PDCP is given in 3GPP specification TS 25.323. Broadcast Multicast Control(BMC) The Broadcast Multicast Control Protocol performs the following functions:  Storage of Cell Broadcast Messages.  Traffic volume monitoring and radio resource request for CBS.  Scheduling of BMC messages.  Transmission of BMC messages to UE.  Delivery of Cell Broadcast messages to upper layer. UTRAN Frame Protocols(FP) UTRAN frame protocols are radio network layer user-plane protocols that carry UMTS user data over the common UT RAN transport network. They are active across the UTRAN interfaces Iu, Iur and Iub. The transport network service used by frame protocols is based on either ATM or the IP protocol stack.
  • 39. 31 C h a p t e r 3 ChannelStructure and Function Overview Channel Type Three separate channels concepts in the UT RA N: logical, transport, and physical channels.  Logical channels define what type of data is transferred. It can be divided into two large types:  Control channel  Service channel.  Transport channels define how and with which type of characteristics the data is transferred by the physical layer. A general classification of transport channels is into two types:  Dedicated channel: used by dedicated user.  Common channel: used by all users within one cell.  Physical data define the exact physical characteristics of the radio channel. In WCDMA, each radio frame of the physical channel has a length of 10 ms, and there are 15 timeslots. Each timeslot has a length of Tslot = 2560 chips, corresponding to one power control cycle. In other words, one power control cycle is 10/15 ms.
  • 40. WCDMA Theory 32 Confidential and Proprietary Information of ZTE CORPORATION FI GU R E 17 CHA NNEL TY P ES IN UTRAN The three types of channels correspond to the egresses of different layers of the protocol stack. The logical channel is between the MAC and RLC, the transport channel is between the MAC and layer 1, and the physical channel is below layer 1. Channel Mapping Channel mapping is shown as Figure 18 and Figure 19. FI GU R E 18 UPL I N K M APPI N G
  • 41. Chapter 3 Channel Structure and Function 33 FI GU R E 19 DOW N L I N K M APPI N G The transport channel to physical channel mapping is illustrated in Table 4. TAB L E 4 TR AN SPOR T C H AN N EL TO PH YSI C AL C H AN N EL MAPPI N G Transport Channel Physical Channel (UL/DL) Dedicated CHannel DCH Dedicated Physical Data CHannel DPDCH Dedicated Physical Control CHannel DPCCH (UL) Random Access CHannel RACH Physical Random Access CHannel PRACH (UL) Common Packet CHannel CPCH Physical Common Packet CHannel PCPCH (DL) Broadcast CHannel BCH Primary Common Control Physical CHannel P-CCPCH (DL) Forward Access CHannel FACH Secondary Common Control Physical Channel S-CCPCH (DL) Downlink Shared CHannel DSCH Physical Downlink Shared CHannel PDSCH No mapping transport channels for these signaling physical channels Synchronisation CHannel SCH Common PIlot CHannel CPICH Acquisition Indication CHannel AICH Paging Indication CHannel PICH CPCH Status Indication CHannel CSICH
  • 42. WCDMA Theory 34 Confidential and Proprietary Information of ZTE CORPORATION Transport Channel Physical Channel Collision Detection/Channel Assignment Indicator CHannel CD/CA-ICH A dedicated channel (DCH) is mapped onto two physical channels. The Dedicated Physical Data Channel (DPDCH) carries higher layer information, including user data, while the Dedicated Physical Control Channel (DPCCH) carries the necessary physical layer control information. These two dedicated physical channels are needed to support efficiently the variable bit rate in the physical layer. The bit rate of the DPCCH is constant, while the bit rate of DPDCH can change from frame to frame. Transport channels contain the data generated at the higher layers, which is carried over the air and are mapped in the physical layer to different physical channels. The data is sent by transport block from MAC layer to physical layer and generated by MAC layer every 10 ms. The transport format of each transport channel is identified by the Transport Format Indicator (TFI), which is used in the interlayer communication between the MAC layer and physical layer. Several transport channels can be multiplexed together by physical layer to form a single Coded Composite Transport Channel(CCTrCh). The physical layer combines several TFI information into the Transport Format Combination Indicator (TFCI), which indicate which transport channels are active for the current frame. Two types of transport channels: dedicated channels and common channels.  Dedicated channel –reserved for a single user only. Support fast power control and soft handover.  Common channel – can be used by any user at any time. Don’t support soft handover but some support fast power control. Note: There exist physical channels to carry only information relevant to physical layer procedures. That means in addition to the physical channels mapped from the transport channels, there exist physical channels for signaling purposes to carry only information between network and the terminals. The Synchronisation Channel(SCH), the Common Pilot Channel (CPICH) and the Acquisition Indication Channel (AICH)are not directly visible to higher layers and are mandatory from the system function point ofview, to be transmitted from every base station. The CPCH Status Indication Channel(CSICH) and the
  • 43. Chapter 3 Channel Structure and Function 35 Collision Detection/Channel Assignment Indication Channel (CD/CA-ICH) are needed if CPCH is used. Logical Channel Logical channels are divided into control channel and traffic channel. FI GU R E 20 LOGI C AL C H AN N EL Control channels only used to transport control plane information, including BCCH,PCCH,CCCH,DCCH,SHCCH. Traffic channels only used to transport user plane information. Including DTCH,CTCH. Transport Channel Transport channels are services offered by Layer 1 to the higher layers. A transport channel is defined by how and with what characteristics data is transferred over the air interface. A general classification of transport channels is into two groups:  Dedicated channel: used by dedicated user.  Common channel: used by all users within one cell.
  • 44. WCDMA Theory 36 Confidential and Proprietary Information of ZTE CORPORATION FI GU R E 21 TR AN SPOR T C H AN N EL BCH PCH FACH DSCH RACH CPCH DCH DCH There exists only one type of dedicated transport channel, the Dedicated Channel (DCH). The Dedicated Channel (DCH) is a downlink or uplink transport channel. The DCH is transmitted over the entire cell or over only a part of the cell using e.g. beam-forming antennas. There are six types of common transport channels: BCH, FACH, PCH, RACH, CPCH and DSCH.  Broadcast Channel -BCH The Broadcast Channel (BCH) is a downlink transport channel that is used to broadcast system- and cell-specific information. The BCH is always transmitted over the entire cell and has a single transport format.  Forward Access Channel -FACH The Forward Access Channel (FACH) is a downlink transport channel. The FACH is transmitted over the entire cell. It is used to transmit control information after base station has received the random access requirement sent by UE. FACH is also can be used to send packet data. There is one or several FACH within one cell. One of them must has low data rate, so all terminals in this cell can receive it. The others can have high data rate.  Paging Channel - PCH The Paging Channel (PCH) is a downlink transport channel. The PCH is always transmitted over the entire cell. The transmission of the PCH is associated with the transmission of physical-layer generated Paging Indicators, to support efficient sleep-mode procedures.  Random Access Channel - RACH The Random Access Channel (RACH) is an uplink transport channel. The RACH is always received from the entire cell. It is used to carry control information (such as call setup
  • 45. Chapter 3 Channel Structure and Function 37 request) sent by UE. The RACH is characterized by a collision risk and by being transmitted using open loop power control.  Common Packet Channel - CPCH The Common Packet Channel (CPCH) is an uplink transport channel. CPCH is associated with a dedicated channel on the downlink which provides power control and CPCH Control Commands (e.g. Emergency Stop) for the uplink CPCH. The CPCH is characterized by initial collision risk and by being transmitted using inner loop power control.  Downlink Shared Channel - DSCH The Downlink Shared Channel (DSCH) is a downlink transport channel shared by several UEs. The DSCH is associated with one or several downlink DCH. The DSCH is transmitted over the entire cell or over only a part of the cell using e.g. beam-forming antennas. Physical Channel Physical channels are defined by a specific carrier frequency, scrambling code, channelization code (optional), time start & stop (giving a duration) and, on the uplink, relative phase (0 or /2). There are two types of physical channel:  Uplink physical channel  Downlink physical channel Uplink Physical Channel There are two types of uplink dedicated physical channels(Uplink Dedicated Physical Data Channel and Uplink Dedicated Physical Control Channel) and two types of uplink common physical channels(Physical Random Access Channel and Physical Common Packet Channel) as shown in Figure 22.
  • 46. WCDMA Theory 38 Confidential and Proprietary Information of ZTE CORPORATION FI GU R E 22 U PL I N K PH YSI C AL C H AN N EL Uplink Dedicated Physical Channel(DPCCH DPDCH) There are two types of uplink dedicated physical channels, the uplink Dedicated Physical Data Channel (uplink DPDCH) and the uplink Dedicated Physical Control Channel (uplink DPCCH).The DPDCH and the DPCCH are I/Q code multiplexed within each radio frame. The uplink DPDCH is used to carry the DCH transport channel. There may be zero, one, or several uplink DPDCHs on each radio link. The uplink DPCCH is used to carry control information generated at Layer 1. The Layer 1 control information consists of known pilot bits to support channel estimation for coherent detection, transmit power-control (TPC) commands, feedback information (FBI), and an optional transport-format combination indicator (TFCI). The transport-format combination indicator informs the receiver about the instantaneous transport format combination of the transport channels mapped to the simultaneously transmitted uplink DPDCH radio frame. There is one and only one uplink DPCCH on each radio link. Figure 23 shows the frame structure of the uplink dedicated physical channels. Each radio frame of length 10 ms is split into 15 slots, each of length Tslot = 2560 chips, corresponding to one power-control period.
  • 47. Chapter 3 Channel Structure and Function 39 FI GU R E 23 F R AME STR U C TU R E OF U PL I N K D ED I C ATED PH YSI C AL C H AN N EL The parameter k in figure determines the number of bits per uplink DPDCH slot. It is related to the spreading factor SF of the DPDCH as SF = 256/2k. The DPDCH spreading factor may range from 256 down to 4. The spreading factor of the uplink DPCCH is always equal to 256, i.e. there are 10 bits per uplink DPCCH slot. The exact number of bits of the uplink DPDCH and the different uplink DPCCH fields (Npilot, NTFCI, NFBI, and NTPC) is configured by higher layers and can also be reconfigured by higher layers. The FBI bits are used to support techniques requiring feedback from the UE to the UTRAN Access Point, including closed loop mode transmit diversity and site selection diversity transmission (SSDT). There are two types of uplink dedicated physical channels; those that include TFCI (e.g. for several simultaneous services) and those that do not include TFCI (e.g. for fixed-rate services). It is the UTRAN that determines if a TFCI should be transmitted and it is mandatory for all UEs to support the use of TFCI in the uplink. Npilot =3, 4, 5, 6, 7 and 8. The shadowed column part of pilot bit pattern is defined as FSW and FSWs can be used to confirm frame synchronization. (The value of the pilot bit pattern other than FSWs shall be "1".) TPC is corresponding to power contrl command. Multi-code operation is possible for the uplink dedicated physical channels. When multi-code transmission is used, several parallel DPDCH are transmitted using different channelization codes. However, there is only one DPCCH per radio link.
  • 48. WCDMA Theory 40 Confidential and Proprietary Information of ZTE CORPORATION Physical Random Access Channel (PRACH) The random-access transmission is based on a Slotted ALOHA approach with fast acquisition indication. The UE can start the random-access transmission at the beginning of a number of well-defined time intervals, denoted access slots. There are 15 access slots per two frames and they are spaced 5120 chips apart Information on what access slots are available for random-access transmission is given by higher layers. The random- access transmission consists of one or several preambles of length 4096 chips and a message of length 10 ms or 20 ms. FI GU R E 24 F R AME STR U C TU R E OF R AN D OM AC C ESS C H AN N EL Pilot Npilot bits Data Ndata bits Slot #0 Slot #1 Slot #i Slot #14 Tslot = 2560 chips, 10*2k bits (k=0..3) Message part radio frame TRACH = 10 ms Data Control TFCI NTFCI bits Each preamble is of length 4096 chips and consists of 256 repetitions of a signature of length 16 chips. There are a maximum of 16 available signatures. The 10 ms message part radio frame is split into 15 slots, each of length Tslot = 2560 chips. Each slot consists of two parts, a data part to which the RACH transport channel is mapped and a control part that carries Layer 1 control information. The data and control parts are transmitted in parallel. A 10 ms message part consists of one message part radio frame, while a 20 ms message part consists of two
  • 49. Chapter 3 Channel Structure and Function 41 consecutive 10 ms message part radio frames. The message part length is equal to the Transmission Time Interval of the RACH Transport channel in use. This TTI length is configured by higher layers. The data part consists of 10*2k bits, where k=0,1,2,3. This corresponds to a spreading factor of 256, 128, 64, and 32 respectively for the message data part. The control part consists of 8 known pilot bits to support channel estimation for coherent detection and 2 TFCI bits. This corresponds to a spreading factor of 256 for the message control part. The pilot bit pattern is described in table 8. The total number of TFCI bits in the random- access message is 15*2 = 30. The TFCI of a radio frame indicates the transport format of the RACH transport channel mapped to the simultaneously transmitted message part radio frame. In case of a 20 ms PRACH message part, the TFCI is repeated in the second radio frame. Physical Common Packet Channel(PCPCH) The Physical Common Packet Channel (PCPCH) is used to carry the CPCH CPCH. The CPCH transmission is based on DSMA-CD approach with fast acquisition indication. The UE can start transmission at the beginning of a number of well-defined time-intervals, relative to the frame boundary of the received BCH of the current cell. The PCPCH access transmission consists of one or several Access Preambles [A-P] of length 4096 chips, one Collision Detection Preamble (CD-P) of length 4096 chips, a DPCCH Power Control Preamble (PC-P) which is either 0 slots or 8 slots in length, and a message of variable length Nx10 ms. FI GU R E 25 F R AME STR U C TU R E OF CPCH
  • 50. WCDMA Theory 42 Confidential and Proprietary Information of ZTE CORPORATION Pilot Npilot bits TPC NTPC bits Data Ndata bits Slot #0 Slot #1 Slot #i Slot #14 Tslot = 2560 chips, 10*2k bits (k=0..6) 1 radio frame: Tf = 10 ms Data Control FBI NFBI bits TFCI NTFCI bits  CPCH access preamble part: Similar to RACH preamble part. The RACH preamble signature sequences are used. The number of sequences used could be less than the ones used in the RACH preamble. The scrambling code could either be chosen to be a different code segment of the Gold code used to form the scrambling code of the RACH preambles or could be the same scrambling code in case the signature set is shared.  CPCH collision detection preamble part: Similar to RACH preamble part. The RACH preamble signature sequences are used. The scrambling code is chosen to be a different code segment of the Gold code used to form the scrambling code for the RACH and CPCH preambles  CPCH power control preamble part: The power control preamble segment is called the CPCH Power Control Preamble (PC-P) part. The Power Control Preamble length is a higher layer parameter, Lpc-preamble, which shall take the value 0 or 8 slots. The TFCI field is filled with "1" bits.  CPCH message part: Similar to uplink dedicated channel, Each 10 ms frame is split into 15 slots, each of length Tslot = 2560 chips. Each slot consists of two parts, a data part that carries higher layer information and a control part that carries Layer 1 control information. The data and control parts are transmitted in parallel. The sf of CPCH message part is 256. Downlink Physical Channel Downlink physical channels include Dedicated physical channel one Shared Physical Channel five Common Control Channel:
  • 51. Chapter 3 Channel Structure and Function 43  Downlink Detedicated physical channel -DPCH  Primary and secondary Commnon Pilot Channel - CPICH  primary and secondary Common Control Physicl Channel - CCPCH  Synchronous Channel - SCH  Physical Downlink Shared Channel - DSCH  Acquisition Indication Channel - AICH  Paging Indication Channel - PICH Downlink physical channel is shown as Figure 26. FI GU R E 26 D OW N L I N K PH YSI C AL C H AN N EL Downlink Dedicated Physical Channel(DPCH) There is only one type of downlink dedicated physical channel, the Downlink Dedicated Physical Channel (downlink DPCH). Within one downlink DPCH, dedicated data generated at Layer 2 and above, i.e. the dedicated transport channel (DCH), is transmitted in time- multiplex with control information generated at Layer 1 (known pilot bits, TPC commands, and an optional TFCI). The downlink DPCH can thus be seen as a time multiplex of a downlink DPDCH and a downlink DPCCH. Each frame of length 10 ms is split into 15 slots, each of length Tslot = 2560 chips, corresponding to one power-control period.
  • 52. WCDMA Theory 44 Confidential and Proprietary Information of ZTE CORPORATION FI GU R E 27 F R AME STR U C TU R E OF DL DPCH The parameter k in Figure 27 determines the total number of bits per downlink DPCH slot. It is related to the spreading factor SF of the physical channel as SF = 512/2k. The spreading factor may thus range from 512 down to 4. The exact number of bits of the different downlink DPCH fields (Npilot, NTPC, NTFCI, Ndata1 and Ndata2) is given in table 11. What slot format to use is configured by higher layers and can also be reconfigured by higher layers. There are basically two types of downlink Dedicated Physical Channels; those that include TFCI (e.g. for several simultaneous services) and those that do not include TFCI (e.g. for fixed-rate services). It is the UTRAN that determines if a TFCI should be transmitted and it is mandatory for all UEs to support the use of TFCI in the downlink. Npilot=2,4,8 & 16。 TPC symbol is corresponding to transmission power control command T “0” or “1”. Synchronisation Channel(SCH) The Synchronisation Channel (SCH) is a downlink signal used for cell search. The SCH consists of two sub channels, the Primary and Secondary SCH. The 10 ms radio frames of the Primary and Secondary SCH are divided into 15 slots, each of length 2560 chips. The frame structure of the SCH is shown in Figure 28.
  • 53. Chapter 3 Channel Structure and Function 45 FI GU R E 28 FR AME STR U C TU R E OF SCH Primary SCH Secondary SCH 256 chips 2560 chips One 10 ms SCH radio frame acs i,0 acp acs i,1 acp acs i,14 acp Slot #0 Slot #1 Slot #14 The Primary SCH consists of a modulated code of length 256 chips, the Primary Synchronisation Code (PSC) denoted cp in figure , transmitted once every slot. The PSC is the same for every cell in the system. The Secondary SCH consists of repeatedly transmitting a length 15 sequence of modulated codes of length 256 chips, the Secondary Synchronisation Codes (SSC), transmitted in parallel with the Primary SCH. The SSC is denoted cs i,k in figure , where i = 0, 1, …, 63 is the number of the scrambling code group, and k = 0, 1, …, 14 is the slot number. Each SSC is chosen from a set of 16 different codes of length 256. This sequence on the Secondary SCH indicates which of the code groups the cell's downlink scrambling code belongs to. Common Pilot Channel (CPICH) The CPICH is a fixed rate (30 kbps, SF=256) downlink physical channel that carries a pre-defined bit sequence. The frame structure of CPICH is shown in Figure 29. FI GU R E 29 F R AME STR U C TU R E OF CPICH Pre-defined bit sequence Slot #0 Slot #1 Slot #i Slot #14 Tslot = 2560 chips , 20 bits 1 radio frame: Tf = 10 ms There are two types of Common pilot channels, the Primary and Secondary CPICH. They differ in their use and the limitations placed on their physical features.  Primary CPICH
  • 54. WCDMA Theory 46 Confidential and Proprietary Information of ZTE CORPORATION  An important area for the primary common pilot channel is the measurements for the handover and cell selection/reselection. The use of CPICH reception level at the terminal for handover measurements has the consequence that, by adjusting the CPICH power level, the cell load can be balanced between different cells. Reducing the CPICH power causes part of the terminals to hand over to other cells, while increasing it invites more terminals to hand over to the cell, as well as to make their initial access to the network in that cell.  The Primary Common Pilot Channel (P-CPICH) has the following characteristics: i. The same channelization code is always used for the P- CPICH. ii. The P-CPICH is scrambled by the primary scrambling code. iii. There is one and only one P-CPICH per cell. iv. The P-CPICH is broadcast over the entire cell.  The Primary CPICH is a phase reference for the following downlink channels: SCH, Primary CCPCH, AICH, PICH AP- AICH, CD/CA-ICH, CSICH, DL-DPCCH for CPCH and the S-CCPCH. By default, the Primary CPICH is also a phase reference for downlink DPCH and any associated PDSCH. The UE is informed by higher layer signaling if the P- CPICH is not a phase reference for a downlink DPCH and any associated PDSCH. The Primary CPICH is always a phase reference for a downlink physical channel using closed loop TX diversity.  Secondary CPICH may be phase reference for the secondary CCPCH.  A Secondary Common Pilot Channel (S-CPICH) has the following characteristics: i. An arbitrary channelization code of SF=256 is used for the S-CPICH. ii. A S-CPICH is scrambled by either the primary or a secondary scrambling code. iii. There may be zero, one, or several S-CPICH per cell. iv. A S-CPICH may be transmitted over the entire cell or only over a part of the cell. A Secondary CPICH may be a phase reference for a downlink DPCH. If this is the case, the UE is informed about this by higher-layer signaling. The Secondary CPICH can be a phase reference for a downlink physical channel using open loop TX diversity, instead of the Primary CPICH being a phase reference.
  • 55. Chapter 3 Channel Structure and Function 47 Paging Indication Channel (PICH) The Paging Indicator Channel (PICH) is a fixed rate (SF=256) physical channel used to carry the paging indicators. The PICH is always associated with an S-CCPCH to which a PCH transport channel is mapped. Figure 24 illustrates the frame structure of the PICH. One PICH radio frame of length 10 ms consists of 300 bits (b0, b1, …, b299). Of these, 288 bits (b0, b1, …, b287) are used to carry paging indicators. The remaining 12 bits are not formally part of the PICH and shall not be transmitted (DTX). The part of the frame with no transmission is reserved for possible future use. FI GU R E 30 FR AME STR U C TU R E OF PICH b1b0 288 bits for paging indication 12 bits (transmission off) One radio frame (10 ms) b287 b288 b299 In each PICH frame, Np paging indicators {P0, …, PNp-1} are transmitted, where Np=18, 36, 72, or 144. The PI calculated by higher layers for use for a certain UE, is associated to the paging indicator Pq, where q is computed as a function of the PI computed by higher layers, the SFN of the P-CCPCH radio frame during which the start of the PICH radio frame occurs, and the number of paging indicators per frame (Np):          Np Np SFNSFNSFNSFNPIq mod 144 144mod512/64/8/18            Further, the PI calculated by higher layers is associated with the value of the paging indicator Pq. If a paging indicator in a certain frame is set to "1" it is an indication that UEs associated with this paging indicator and PI should read the corresponding frame of the associated S-CCPCH. The PI bitmap in the PCH data frames over Iub contains indication values for all higher layer PI values possible. Each bit in the bitmap indicates if the paging indicator associated with that particular PI shall be set to 0 or 1. Hence, the calculation in the formula above is to be performed in Node B to make the association between PI and Pq..The mapping from {P0, …, PNp-1} to the PICH bits {b0, …, b287} are according to Table 5.
  • 56. WCDMA Theory 48 Confidential and Proprietary Information of ZTE CORPORATION TAB L E 5 M APPI N G OF PAGI N G I N D I C ATOR S PQ TO PICH B I TS Number of paging indicators per frame (Np) Pq = 1 Pq = 0 Np=18 {b16q, …, b16q+15} = {1, 1,…, 1} {b16q, …, b16q+15} = {0, 0,…, 0} Np=36 {b8q, …, b8q+7} = {1, 1,…, 1} {b8q, …, b8q+7} = {0, 0,…, 0} Np=72 {b4q, …, b4q+3} = {1, 1,…, 1} {b4q, …, b4q+3} = {0, 0,…, 0} Np=144 {b2q, b2q+1} = {1, 1} {b2q, b2q+1} = {0, 0} Acqusition Indication Channel(AICH) The Acquisition Indicator channel (AICH) is a fixed rate (SF=256) physical channel used to carry Acquisition Indicators (AI). Acquisition Indicator AIs corresponds to signature s on the PRACH. Figure illustrates the structure of the AICH. The AICH consists of a repeated sequence of 15 consecutive access slots (AS), each of length 5120 chips. Each access slot consists of two parts, an Acquisition-Indicator (AI) part consisting of 32 real-valued symbols a0, …, a31 and a part of duration 1024 chips with no transmission that is not formally part of the AICH. The part of the slot with no transmission is reserved for possible use by CSICH or possible future use by other physical channels. The spreading factor (SF) used for channelisation of the AICH is 256. The phase reference for the AICH is the Primary CPICH. FI GU R E 31 FR AME STR U C TU R E OF AICH 1024 chips Transmission Off AS #14 AS #0 AS #1 AS #i AS #14 AS #0 a1 a2a0 a31a30 AI part = 4096 chips, 32 real-valued symbols 20 ms
  • 57. Chapter 3 Channel Structure and Function 49 CPCH Access Preamble Acqusition Indication Channel (AP-AICH) The Access Preamble Acquisition Indicator channel (AP-AICH) is a fixed rate (SF=256) physical channel used to carry AP acquisition indicators (API) of CPCH. AP acquisition indicator APIs corresponds to AP signature s transmitted by UE. AP-AICH and AICH may use the same or different channelisation codes. The phase reference for the AP-AICH is the Primary CPICH. Frame structure of AP-AICH is shown as Figure 32. FI GU R E 32 FR AME STR U C TU R E OF AP-AICH 1024 chips Transmission Off AS #14 AS #0 AS #1 AS #i AS #14 AS #0 a1 a2a0 a31a30 API part = 4096 chips, 32 real-valued symbols 20 ms The AP-AICH has a part of duration 4096 chips where the AP acquisition indicator (API) is transmitted, followed by a part of duration 1024chips with no transmission that is not formally part of the AP-AICH. The part of the slot with no transmission is reserved for possible use by CSICH or possible future use by other physical channels. CPCH Collision Detection/Channel Assignment Indicator Channel (CD/CA -ICH) The Collision Detection Channel Assignment Indicator channel (CD/CA-ICH) is a fixed rate (SF=256) physical channel used to carry CD Indicator (CDI) only if the CA is not active, or CD Indicator/CA Indicator (CDI/CAI) at the same time if the CA is active. The structure of CD/CA-ICH is shown in Figure 33.
  • 58. WCDMA Theory 50 Confidential and Proprietary Information of ZTE CORPORATION FI GU R E 33 FR AME STR U C TU R E OF CD/CA-ICH 1024 chips Transmission Off AS #14 AS #0 AS #1 AS #i AS #14 AS #0 a1 a2a0 a31a30 CDI/CAI part = 4096 chips, 32 real-valued symbols 20 ms CD/CA-ICH and AP-AICH may use the same or different channelisation codes. The CD/CA-ICH has a part of duration of 4096chips where the CDI/CAI is transmitted, followed by a part of duration 1024chips with no transmission that is not formally part of the CD/CA-ICH. The part of the slot with no transmission is reserved for possible use by CSICH or possible future use by other physical channels. The spreading factor (SF) used for channelisation of the CD/CA-ICH is 256. Commnon Control Physical Channel Common control physical channel consists of Primary Common Control Physical Channel (PCCPCH) and Secondary Common Control Physical Channel (SCCPCH).  The Primary CCPCH is a fixed rate (30 kbps, SF=256) downlink physical channels used to carry the BCH transport channel. The frame structure of the Primary CCPCH is shown as Figure 34. FI GU R E 34 FR AME STR U C TU R E OF P-CCPCH Data Ndata1=18 bits Slot #0 Slot #1 Slot #i Slot #14 Tslot = 2560 chips , 20 bits 1 radio frame: Tf = 10 ms (Tx OFF) 256 chips
  • 59. Chapter 3 Channel Structure and Function 51 The frame structure differs from the downlink DPCH in that no TPC commands, no TFCI and no pilot bits are transmitted. The Primary CCPCH is not transmitted during the first 256 chips of each slot. Instead, Primary SCH and Secondary SCH are transmitted during this period  Secondary Commnon Control Physical Channel (S-CCPCH) The Secondary CCPCH is used to carry the FACH and PCH. There are two types of Secondary CCPCH: those that include TFCI and those that do not include TFCI. It is the UTRAN that determines if a TFCI should be transmitted, hence making it mandatory for all UEs to support the use of TFCI. The set of possible rates for the Secondary CCPCH is the same as for the downlink DPCH. The frame structure of S-CCPCH is shown in Figure 35. FI GU R E 35 FR AME STR U C TU R E OF S-CCPCH Slot #0 Slot #1 Slot #i Slot #14 Tslot = 2560 chips, 20*2k bits (k=0..6) Pilot Npilot bits Data Ndata1 bits 1 radio frame: Tf = 10 ms TFCI NTFCI bits The parameter k determines the total number of bits per downlink Secondary CCPCH slot. It is related to the spreading factor SF of the physical channel as SF = 256/2k. The spreading factor range is from 256 down to 4. The FACH and PCH can be mapped to the same or to separate Secondary CCPCHs. If FACH and PCH are mapped to the same Secondary CCPCH, they can be mapped to the same frame. The main difference between a CCPCH and a downlink dedicated physical channel is that a CCPCH is not inner-loop power controlled. The main difference between the Primary and Secondary CCPCH is that the transport channel mapped to the Primary CCPCH (BCH) can only have a fixed predefined transport format combination, while the Secondary CCPCH support multiple transport format combinations using TFCI. Physical Downlink Shared Channel (PDSCH) The Physical Downlink Shared Channel (PDSCH) is used to carry the Downlink Shared Channel (DSCH).
  • 60. WCDMA Theory 52 Confidential and Proprietary Information of ZTE CORPORATION A PDSCH corresponds to a channelisation code below or at a PDSCH root channelisation code. A PDSCH is allocated on a radio frame basis to a single UE. Within one radio frame, UT RAN may allocate different PDSCHs under the same PDSCH root channelisation code to different UEs based on code multiplexing. Within the same radio frame, multiple parallel PDSCHs, with the same spreading factor, may be allocated to a single UE. This is a special case of multi-code transmission. All the PDSCHs are operated with radio frame synchronisation. PDSCHs allocated to the same UE on different radio frames may have different spreading factors. The frame structure of the PDSCH is shown in Figure 36. FI GU R E 36 FR AME STR U C TU R E OF PDSCH Slot #0 Slot #1 Slot #i Slot #14 Tslot = 2560 chips, 20*2k bits (k=0..6) Data Ndata1 bits 1 radio frame: Tf = 10 ms For each radio frame, each PDSCH is associated with one downlink DPCH. The PDSCH and associated DPCH do not necessarily have the same spreading factors and are not necessarily frame aligned. All relevant Layer 1 control information is transmitted on the DPCCH part of the associated DPCH, i.e. the PDSCH does not carry Layer 1 information. To indicate for UE that there is data to decode on the DSCH, the TFCI field of the associated DPCH shall be used. The TFCI informs the UE of the instantaneous transport format parameters related to the PDSCH as well as the channelisation code of the PDSCH. Physical Layer Procedure Cell search procedure During the cell search, the UE searches for a cell and determines the downlink scrambling code and frame synchronisation of that cell. The cell search is typically carried out in three steps:
  • 61. Chapter 3 Channel Structure and Function 53  Step 1: slot synchronous During the first step of the cell search procedure the UE uses the SCH’s primary synchronisation code to acquire slot synchronisation to a cell. This is typically done with a single matched filter (or any similar device) matched to the primary synchronisation code which is common to all cells. The slot timing of the cell can be obtained by detecting peaks in the matched filter output.  Step 2: frame synchronous and code-group identification During the second step of the cell search procedure, the UE uses the SCH’s secondary synchronisation code to find frame synchronisation and identify the code group of the cell found in the first step. This is done by correlating the received signal with all possible secondary synchronisation code sequences, and identifying the maximum correlation value. Since the cyclic shifts of the sequences are unique the code group as well as the frame synchronisation is determined.  Step 3: scrambling-code identification During the third and last step of the cell search procedure, the UE determines the exact primary scrambling code used by the found cell. The primary scrambling code is typically identified through symbol-by-symbol correlation over the CPICH with all codes within the code group identified in the second step. After the primary scrambling code has been identified, the Primary CCPCH can be detected.And the system- and cell specific BCH information can be read. Random Access Procedure At each initiation of the physical random access procedure, Layer 1 shall receive the following information from the higher layers (MAC):  The Transport Format to be used for the PRACH message part.  The ASC of the PRACH transmission.  The data to be transmitted (Transport Block Set). The physical random-access procedure shall be performed as follows: 1. Derive the available uplink access slots, in the next full access slot set, for the set of available RACH sub-channels within the ASC Randomly select one access slot among the ones previously determined. If there is no access slot available in the selected set, randomly select one uplink access slot corresponding to the set of available RACH sub- channels within the given ASC from the next access slot set. The random function shall be such that each of the allowed selections is chosen with equal probability.
  • 62. WCDMA Theory 54 Confidential and Proprietary Information of ZTE CORPORATION 2. Randomly select a signature from the set of available signatures within the given ASC. The random function shall be such that each of the allowed selections is chosen with equal probability. 3. Set the Preamble Retransmission Counter to Preamble Retrans Max. 4. Set the parameter Commanded Preamble Power to Preamble_Initial_Power. 5. In the case that the Commanded Preamble Power exceeds the maximum allowed value, set the preamble transmission power to the maximum allowed power. In the case that the Commanded Preamble Power is below the minimum level required in [7], set the preamble transmission power to a value, which shall be at or above the Commanded Preamble Power and at or below the required minimum power specified in [7]. Otherwise set the preamble transmission power to the Commanded Preamble Power. Transmit a preamble using the selected uplink access slot, signature, and preamble transmission power. 6. If no positive or negative acquisition indicator (AI  +1 nor – 1) corresponding to the selected signature is detected in the downlink access slot corresponding to the selected uplink access slot: i. Select the next available access slot in the set of available RACH sub-channels within the given ASC. ii. Randomly select a new signature from the set of available signatures within the given ASC. The random function shall be such that each of the allowed selections is chosen with equal probability. iii. Increase the Commanded Preamble Power by P0 = Power Ramp Step [dB]. If the Commanded Preamble Power exceeds the maximum allowed power by 6dB, the UE may pass L1 status ("No ack on AICH") to the higher layers (MAC) and exit the physical random access procedure. ivi. Decrease the Preamble Retransmission Counter by one. vii. If the Preamble Retransmission Counter > 0 then repeat from step 5. Otherwise pass L1 status ("No ack on AICH") to the higher layers (MAC) and exit the physical random access procedure. 7. If a negative acquisition indicator corresponding to the selected signature is detected in the downlink access slot corresponding to the selected uplink access slot, pass L1 status ("Nack on AICH received") to the higher layers (MAC) and exit the physical random access procedure. 8. Transmit the random access message three or four uplink access slots after the uplink access slot of the last transmitted preamble depending on the AICH transmission
  • 63. Chapter 3 Channel Structure and Function 55 timing parameter. Transmission power of the control part of the random access message should be P p-m [dB] higher than the power of the last transmitted preamble. 9. Pass L1 status "RACH message transmitted" to the higher layers and exit the physical random access procedure.
  • 64.
  • 65. 57 C h a p t e r 4 Network Transport Overview ATM(Asynchronous Transfer Mode) is an effective data transmission technology in IMT-2000. ATM is the transport technology used in the first release of the UTRAN, 3GPP R99 implementation. Ever since 3GPP R5, user data can be transported across all UTRAN interfaces by using the IP protocol stack as well. Protocol stacks for ATM and IP transport is shown in Figure 37. FI GU R E 37 PR OTOC OL STAC K S F OR ATM AN D IP TR AN SPOR T (a) control-plane protocols in the transport network (b) user-plane protocols in the transport network From Release 5, ATM transport and IP transport are equally valid choices for all user-plane and control-plane UTRAN interfaces.
  • 66. WCDMA Theory 58 Confidential and Proprietary Information of ZTE CORPORATION Asynchronous Transfer Mode in UMTS Third Generation Partnership Project (3GPP) and Number 2 (3GPP2) standards specify that all the elements of the Radio Access Network should be interconnected by utilising an ATM transport network. As a result, currently available UMTS Radio Access Network (RAN) elements from different manufacturers are equipped with ATM technology. Practically, this means that RAN elements include an ATM access port and employ ATM signalling protocols and switching technology. It is also possible to use IMA (Inverse Multiplexing for ATM) in RAN. This in turn brings about the possibility of carrying Iub interface traffic over GSM transmission routes, allowing network operators to reuse currently available transmission networks. In addition to flexible resource sharing, the most important benefit of using ATM in RAN comes from the way data packets are formed, classified and carried across the network. Because each ATM connection is uniquely identified with specific classes, the network is capable of supporting an efficient QoS mechanism. This fits well with the bearer architecture thinking of UMTS defined for different classes of QoS, such as Real Time (RT) and Non-Real Time (NRT) services, to be supported simultaneously. These also lead to more efficient resource management, as the Radio Network Controller (RNC) in the RAN will be able to schedule and optimise traffic load across the network. Although ATM will remove the main constraints behind TDM technology, new limitations arise: ATM signalling is too complicated and causes undesirable delays and loads to the network. In addition, ATM may lag behind the reach of economies of scale, an important advantage of such emerging technologies as IP. Therefore, transition from ATM towards IP became the focus of attention in 3GPP and in association with Releases 4 and 5. In the current architecture of UMTS, the operator’s transport network may include base stations (BSs) or Node Bs, RNCs, Base Station Controllers (BSCs), Mobile Switching Centres (MSCs), Serving GPRS Support Nodes (SGSNs), and Operat ion and Management Centres (OMCs). Therefore, ATM-based traffic in the radio access network can travel over E1 User Network Interface (UNI) ATM or E1 IMA, or over one or multiple E1 lines and Synchronous Transport Module 1 (STM-1) links. In order to support different types of traffic ATM Adaptation Layer Type 2 (AAL2) and ATM Adaptation Layer Type 5 (AAL5) for voice and data are used. Transmission media could include fibre optics, E1/T1 copper leased lines, microwave or Digital Subscriber Line (DSL), depending on the economies of scale and the availability of media types. It is also possible to combine different kinds of transmission media. While fibre is the best transport option due to its speed and capacity, E1/T1, microwave, and DSL bring their own advantages to the transport network and time after time
  • 67. Chapter 4 Network Transport 59 they are found to be the only options available due to the cost or lack of backbone infrastructure and the coexistence of 2G and 3G networks. In spite of the dominant presence of ATM in the early phase of UMTS networks, 3GPP has prepared the way for a transition to IP transport. The original design philosophy of ATM was to provide good bandwidth granularity while guaranteeing the delay and jitter requirements for voice services. There is inefficiency in the handling of data packets due to the small size of the packets, which cannot be optimised for different traffic flows. When there is no need for good granularity of ATM (e.g., when the links have a high bit rate and latency is not so critical), the use of IP can become more efficient and lucrative. For the purpose of continuity, however, IP can form an overlay on the existing ATM backbone and, therefore, ATM will keep its role in the cellular network in the near future as well. Basic Configuration of ATM ATM is a technology that divides information to be transmitted into 53-byte frames called cells for transmission and switching. The use of ATM in the RAN is specified under 3GPP Release 1999. There are substantial merits in applying ATM in CN, including the ability to perform traffic management in coordination with RAN, implement CS and PS functions in the same architecture and carry out quality control and operations in an integral manner. ATM has extensive traffic management and quality-control functions for handling traffic characteristics, and is an effective technology for forwarding not only CS services but also PS services. A cell, which is the data transfer unit in ATM, consists of a 5- byte header (which includes routing information etc.) and a 48- byte payload (storing user data). FI GU R E 38 ATM C EL L STR U C TU R E The ATM switching equipment achieves fast switching based on hardware switching with reference to the routing information in the header, without detecting data errors in each cell. The routing information in the header consists of the Virtual Path (VP) and the Virtual Channel (VC). ATM cell header structure is shown as Figure 39.
  • 68. WCDMA Theory 60 Confidential and Proprietary Information of ZTE CORPORATION FI GU R E 39 ATM CELL HEA DER STRUCTURE  VPI (Virtual Path Identifier): the identifier for a Virtual Path (VP) or, more generally, an identifier for a constantly allocated semi-permanent connection.  VCI (Virtual Channel Identifier): an identifier for a Virtual Channel (VC). This field is long because there may be thousands of channels to be identified within one VP (e.g., multimedia applications may require several VCIs simultaneously, one VC per multimedia component).  PT (Payload Type): this indicates whether the 48-byte payload field carries user data or control data.  CLP (Cell Loss Priority): this is a flag indicating whether this ATM cell is “important” or “less important”. If CLP 1 (low priority/less important) the system may lose this ATM cell if it has to.  HEC (Header Error Control): in ATM, the ATM cell header is error-protected. The stratified connection control consisting of VC (which corresponds to the user channel) and VP (which is a bundle of VCs) enable highly flexible, extensible operation and administration. ATM Adaptation Layer type 2 (AAL2) can set multiple-user connections in VC. Figure 40 illustrates the structure of ATM connections.
  • 69. Chapter 4 Network Transport 61 FI GU R E 40 ATM C ON N EC TI ON S Normally, VP is setup on the basis of system data at the time of building the network. VC connections can be divided into Permanent Virtual Channel (PVC), which is inflexibly set up at the time of network construction, and Switched Virtual Channel (SVC), which is established and released on the basis of signaling upon call origination and termination. The establishment and release of the user connection through the operation of SVC helps efficiently use ATM connection and bandwidth resources. ATM Adaptation Layer (AAL) AAL is a protocol for coordinating the higher layer, which has various traffic properties including speech, video streaming and IP packets, and the ATM layer, which is specified regardless of the higher-layer application. Four types of AAL are specified, namely, AAL1,AAL2, AAL3/4 and AAL5 .
  • 70. WCDMA Theory 62 Confidential and Proprietary Information of ZTE CORPORATION FI GU R E 41 ATM ADA P TA TION LA Y ERS (AALS)  AAL1 is used for forwarding continuous, fixed-rate data, such as PCM-coded speech.  AAL2 was originally standardized for the purpose of efficiently forwarding short frames in ATM; such as compressed speech data used in mobile communications, and is applied as the standard for transferring user data in IMT-2000 RAN.  AAL3/4 was developed for data communication purposes, and is distinctive in that it can transfer up to 1024 types of higher-layer data on one VC connection with a Multiple Identifier (MID).  AAL5 is a simpler protocol compared to AAL3/4, and is widely used for forwarding data packets and control signals. AAL2 and AAL5 are applied in IMT-2000 specifications. As shown in Figure 42, AAL is divided into two sublayers: the Convergence Sublayer (CS) and the Segmentation And Re- assembly (SAR) sublayer. The CS adapts AAL to upper protocol layers and the SAR sublayer splits the data to be transmitted into suitable payload pieces and, in the receiving direction, collects payload pieces and assembles them back to the original dataflow.
  • 71. Chapter 4 Network Transport 63 FI GU R E 42 GEN ER AL STR U C TU R E OF AAL TAB L E 6 ATM A DA P T AT ION LA Y ERS U S ED I N UTRAN I N T ERFA CES Iu Iur Iub AAL5 CS C-plane PS C/U-plane - - - C-plane - - - C-plane AAL2 CS U-plane - - - U-plane - - - U-plane C-plane:Control plane; U-plane: User plane AAL2 Figure 43 shows the frame structure of AAL2. FI GU R E 43 AAL2 STR U C TU R E
  • 72. WCDMA Theory 64 Confidential and Proprietary Information of ZTE CORPORATION AAL2 has the function to multiplex up to 256 user connections on one VC connection, and is able to transmit short frames in a highly efficient manner with limited delay. The Common Part Sublayer (CPS) packet consists of a 3-byte header and a payload between 1 and 45 bytes. The header includes a Channel IDentifier (CID) for user identification. Multiple user connections can be transmitted by multiplexing them on one VC connection. CPS packet is carried by CPS-Protocol Data Unit (PDU) to which a one-byte STart Field (STF) is assigned, and converted into cells. Figure 44 illustrates the IMT-2000 interfaces and the AAL type applied to the user-plane transfer. FI GU R E 44 RAN I N TER FA C ES AAL2 is an important protocol applicable from Node B to CN. Although there are no specifications under 3GPP in regard to transmissions inside CN, the application of AAL2 in CN enables the traffic on the interface between Radio Network Contro llers (RNCs) (Iur Interface) to be physically relayed by CN and communications between IMT-2000 terminals to be transmitted by AAL2 between Node Bs, which allows efficient operations. AAL5 AAL5 is suitable for forwarding signaling data and IP packet data. Figure 45 illustrates the frame structure of AAL5.